Oct 2 18:49:16.212111 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Oct 2 18:49:16.212151 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 18:49:16.212174 kernel: efi: EFI v2.70 by EDK II Oct 2 18:49:16.212189 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71accf98 Oct 2 18:49:16.212203 kernel: ACPI: Early table checksum verification disabled Oct 2 18:49:16.212217 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Oct 2 18:49:16.212233 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Oct 2 18:49:16.212248 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 18:49:16.212262 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Oct 2 18:49:16.212276 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 18:49:16.212296 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Oct 2 18:49:16.212310 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Oct 2 18:49:16.212324 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Oct 2 18:49:16.212338 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 18:49:16.212354 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Oct 2 18:49:16.212373 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Oct 2 18:49:16.212388 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Oct 2 18:49:16.212402 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Oct 2 18:49:16.212417 kernel: printk: bootconsole [uart0] enabled Oct 2 18:49:16.212431 kernel: NUMA: Failed to initialise from firmware Oct 2 18:49:16.212446 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:49:16.212460 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Oct 2 18:49:16.212475 kernel: Zone ranges: Oct 2 18:49:16.212490 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Oct 2 18:49:16.212504 kernel: DMA32 empty Oct 2 18:49:16.212518 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Oct 2 18:49:16.212537 kernel: Movable zone start for each node Oct 2 18:49:16.212552 kernel: Early memory node ranges Oct 2 18:49:16.212566 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Oct 2 18:49:16.212581 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Oct 2 18:49:16.212595 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Oct 2 18:49:16.212610 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Oct 2 18:49:16.212624 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Oct 2 18:49:16.212638 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Oct 2 18:49:16.212653 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:49:16.212667 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Oct 2 18:49:16.212701 kernel: psci: probing for conduit method from ACPI. Oct 2 18:49:16.212719 kernel: psci: PSCIv1.0 detected in firmware. Oct 2 18:49:16.212740 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 18:49:16.212755 kernel: psci: Trusted OS migration not required Oct 2 18:49:16.212776 kernel: psci: SMC Calling Convention v1.1 Oct 2 18:49:16.212792 kernel: ACPI: SRAT not present Oct 2 18:49:16.212808 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 18:49:16.212827 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 18:49:16.212862 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 18:49:16.212883 kernel: Detected PIPT I-cache on CPU0 Oct 2 18:49:16.212898 kernel: CPU features: detected: GIC system register CPU interface Oct 2 18:49:16.212913 kernel: CPU features: detected: Spectre-v2 Oct 2 18:49:16.212928 kernel: CPU features: detected: Spectre-v3a Oct 2 18:49:16.212943 kernel: CPU features: detected: Spectre-BHB Oct 2 18:49:16.212958 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 18:49:16.212974 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 18:49:16.212989 kernel: CPU features: detected: ARM erratum 1742098 Oct 2 18:49:16.213004 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Oct 2 18:49:16.213024 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Oct 2 18:49:16.213040 kernel: Policy zone: Normal Oct 2 18:49:16.213058 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:49:16.213074 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 18:49:16.213089 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 18:49:16.213104 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 18:49:16.213120 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 18:49:16.213135 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Oct 2 18:49:16.213151 kernel: Memory: 3826444K/4030464K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 204020K reserved, 0K cma-reserved) Oct 2 18:49:16.213166 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 18:49:16.213185 kernel: trace event string verifier disabled Oct 2 18:49:16.213200 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 18:49:16.213217 kernel: rcu: RCU event tracing is enabled. Oct 2 18:49:16.213232 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 18:49:16.213248 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 18:49:16.213263 kernel: Tracing variant of Tasks RCU enabled. Oct 2 18:49:16.213278 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 18:49:16.213294 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 18:49:16.213309 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 18:49:16.213324 kernel: GICv3: 96 SPIs implemented Oct 2 18:49:16.213339 kernel: GICv3: 0 Extended SPIs implemented Oct 2 18:49:16.213354 kernel: GICv3: Distributor has no Range Selector support Oct 2 18:49:16.213374 kernel: Root IRQ handler: gic_handle_irq Oct 2 18:49:16.213390 kernel: GICv3: 16 PPIs implemented Oct 2 18:49:16.213405 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Oct 2 18:49:16.213420 kernel: ACPI: SRAT not present Oct 2 18:49:16.213435 kernel: ITS [mem 0x10080000-0x1009ffff] Oct 2 18:49:16.213450 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Oct 2 18:49:16.213465 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Oct 2 18:49:16.213481 kernel: GICv3: using LPI property table @0x00000004000c0000 Oct 2 18:49:16.213495 kernel: ITS: Using hypervisor restricted LPI range [128] Oct 2 18:49:16.213511 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Oct 2 18:49:16.213526 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Oct 2 18:49:16.213545 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Oct 2 18:49:16.213561 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Oct 2 18:49:16.213576 kernel: Console: colour dummy device 80x25 Oct 2 18:49:16.213592 kernel: printk: console [tty1] enabled Oct 2 18:49:16.213607 kernel: ACPI: Core revision 20210730 Oct 2 18:49:16.213624 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Oct 2 18:49:16.213640 kernel: pid_max: default: 32768 minimum: 301 Oct 2 18:49:16.213656 kernel: LSM: Security Framework initializing Oct 2 18:49:16.213672 kernel: SELinux: Initializing. Oct 2 18:49:16.213688 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:49:16.213708 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:49:16.213723 kernel: rcu: Hierarchical SRCU implementation. Oct 2 18:49:16.213738 kernel: Platform MSI: ITS@0x10080000 domain created Oct 2 18:49:16.213754 kernel: PCI/MSI: ITS@0x10080000 domain created Oct 2 18:49:16.213769 kernel: Remapping and enabling EFI services. Oct 2 18:49:16.213784 kernel: smp: Bringing up secondary CPUs ... Oct 2 18:49:16.213800 kernel: Detected PIPT I-cache on CPU1 Oct 2 18:49:16.213816 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Oct 2 18:49:16.213831 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Oct 2 18:49:16.213902 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Oct 2 18:49:16.213921 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 18:49:16.213937 kernel: SMP: Total of 2 processors activated. Oct 2 18:49:16.213952 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 18:49:16.213968 kernel: CPU features: detected: 32-bit EL1 Support Oct 2 18:49:16.213983 kernel: CPU features: detected: CRC32 instructions Oct 2 18:49:16.213999 kernel: CPU: All CPU(s) started at EL1 Oct 2 18:49:16.214014 kernel: alternatives: patching kernel code Oct 2 18:49:16.214030 kernel: devtmpfs: initialized Oct 2 18:49:16.214052 kernel: KASLR disabled due to lack of seed Oct 2 18:49:16.214068 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 18:49:16.214084 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 18:49:16.214110 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 18:49:16.214130 kernel: SMBIOS 3.0.0 present. Oct 2 18:49:16.214146 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Oct 2 18:49:16.214162 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 18:49:16.214179 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 18:49:16.214195 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 18:49:16.214211 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 18:49:16.214227 kernel: audit: initializing netlink subsys (disabled) Oct 2 18:49:16.214244 kernel: audit: type=2000 audit(0.252:1): state=initialized audit_enabled=0 res=1 Oct 2 18:49:16.214264 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 18:49:16.214280 kernel: cpuidle: using governor menu Oct 2 18:49:16.214296 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 18:49:16.214312 kernel: ASID allocator initialised with 32768 entries Oct 2 18:49:16.214328 kernel: ACPI: bus type PCI registered Oct 2 18:49:16.214349 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 18:49:16.214365 kernel: Serial: AMBA PL011 UART driver Oct 2 18:49:16.214381 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 18:49:16.214397 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 18:49:16.214414 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 18:49:16.214430 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 18:49:16.214446 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 18:49:16.214462 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 18:49:16.214478 kernel: ACPI: Added _OSI(Module Device) Oct 2 18:49:16.214498 kernel: ACPI: Added _OSI(Processor Device) Oct 2 18:49:16.214514 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 18:49:16.214531 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 18:49:16.214547 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 18:49:16.214563 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 18:49:16.214579 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 18:49:16.214595 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 18:49:16.214612 kernel: ACPI: Interpreter enabled Oct 2 18:49:16.214628 kernel: ACPI: Using GIC for interrupt routing Oct 2 18:49:16.214648 kernel: ACPI: MCFG table detected, 1 entries Oct 2 18:49:16.214665 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Oct 2 18:49:16.227926 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 18:49:16.228158 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 2 18:49:16.228363 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 2 18:49:16.228561 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Oct 2 18:49:16.228780 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Oct 2 18:49:16.228816 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Oct 2 18:49:16.228834 kernel: acpiphp: Slot [1] registered Oct 2 18:49:16.231897 kernel: acpiphp: Slot [2] registered Oct 2 18:49:16.231932 kernel: acpiphp: Slot [3] registered Oct 2 18:49:16.231949 kernel: acpiphp: Slot [4] registered Oct 2 18:49:16.231966 kernel: acpiphp: Slot [5] registered Oct 2 18:49:16.231983 kernel: acpiphp: Slot [6] registered Oct 2 18:49:16.232000 kernel: acpiphp: Slot [7] registered Oct 2 18:49:16.232016 kernel: acpiphp: Slot [8] registered Oct 2 18:49:16.232041 kernel: acpiphp: Slot [9] registered Oct 2 18:49:16.232057 kernel: acpiphp: Slot [10] registered Oct 2 18:49:16.232073 kernel: acpiphp: Slot [11] registered Oct 2 18:49:16.232089 kernel: acpiphp: Slot [12] registered Oct 2 18:49:16.232105 kernel: acpiphp: Slot [13] registered Oct 2 18:49:16.232121 kernel: acpiphp: Slot [14] registered Oct 2 18:49:16.232137 kernel: acpiphp: Slot [15] registered Oct 2 18:49:16.232153 kernel: acpiphp: Slot [16] registered Oct 2 18:49:16.232169 kernel: acpiphp: Slot [17] registered Oct 2 18:49:16.232185 kernel: acpiphp: Slot [18] registered Oct 2 18:49:16.232206 kernel: acpiphp: Slot [19] registered Oct 2 18:49:16.232222 kernel: acpiphp: Slot [20] registered Oct 2 18:49:16.232238 kernel: acpiphp: Slot [21] registered Oct 2 18:49:16.232254 kernel: acpiphp: Slot [22] registered Oct 2 18:49:16.232271 kernel: acpiphp: Slot [23] registered Oct 2 18:49:16.232288 kernel: acpiphp: Slot [24] registered Oct 2 18:49:16.232304 kernel: acpiphp: Slot [25] registered Oct 2 18:49:16.232320 kernel: acpiphp: Slot [26] registered Oct 2 18:49:16.232336 kernel: acpiphp: Slot [27] registered Oct 2 18:49:16.232357 kernel: acpiphp: Slot [28] registered Oct 2 18:49:16.232373 kernel: acpiphp: Slot [29] registered Oct 2 18:49:16.232389 kernel: acpiphp: Slot [30] registered Oct 2 18:49:16.232406 kernel: acpiphp: Slot [31] registered Oct 2 18:49:16.232422 kernel: PCI host bridge to bus 0000:00 Oct 2 18:49:16.232703 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Oct 2 18:49:16.232933 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 2 18:49:16.233120 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Oct 2 18:49:16.233305 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Oct 2 18:49:16.233529 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Oct 2 18:49:16.233746 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Oct 2 18:49:16.233978 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Oct 2 18:49:16.234202 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 18:49:16.234401 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Oct 2 18:49:16.234605 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:49:16.234817 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 18:49:16.235045 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Oct 2 18:49:16.235262 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Oct 2 18:49:16.235473 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Oct 2 18:49:16.235681 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:49:16.239293 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Oct 2 18:49:16.239551 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Oct 2 18:49:16.239768 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Oct 2 18:49:16.240087 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Oct 2 18:49:16.240300 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Oct 2 18:49:16.240489 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Oct 2 18:49:16.240669 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 2 18:49:16.240893 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Oct 2 18:49:16.240925 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 2 18:49:16.240944 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 2 18:49:16.240961 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 2 18:49:16.240978 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 2 18:49:16.240994 kernel: iommu: Default domain type: Translated Oct 2 18:49:16.241011 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 18:49:16.241027 kernel: vgaarb: loaded Oct 2 18:49:16.241043 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 18:49:16.241060 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 18:49:16.241080 kernel: PTP clock support registered Oct 2 18:49:16.241096 kernel: Registered efivars operations Oct 2 18:49:16.241113 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 18:49:16.241129 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 18:49:16.241146 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 18:49:16.241162 kernel: pnp: PnP ACPI init Oct 2 18:49:16.241392 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Oct 2 18:49:16.241419 kernel: pnp: PnP ACPI: found 1 devices Oct 2 18:49:16.241436 kernel: NET: Registered PF_INET protocol family Oct 2 18:49:16.241457 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 18:49:16.241474 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 18:49:16.241491 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 18:49:16.241507 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 18:49:16.241524 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 18:49:16.241540 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 18:49:16.241556 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:49:16.241573 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:49:16.241589 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 18:49:16.241609 kernel: PCI: CLS 0 bytes, default 64 Oct 2 18:49:16.241626 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Oct 2 18:49:16.241642 kernel: kvm [1]: HYP mode not available Oct 2 18:49:16.241658 kernel: Initialise system trusted keyrings Oct 2 18:49:16.241675 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 18:49:16.241691 kernel: Key type asymmetric registered Oct 2 18:49:16.241707 kernel: Asymmetric key parser 'x509' registered Oct 2 18:49:16.241723 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 18:49:16.241739 kernel: io scheduler mq-deadline registered Oct 2 18:49:16.241759 kernel: io scheduler kyber registered Oct 2 18:49:16.241775 kernel: io scheduler bfq registered Oct 2 18:49:16.242015 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Oct 2 18:49:16.242045 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 2 18:49:16.242064 kernel: ACPI: button: Power Button [PWRB] Oct 2 18:49:16.242082 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 18:49:16.242100 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Oct 2 18:49:16.242302 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Oct 2 18:49:16.242332 kernel: printk: console [ttyS0] disabled Oct 2 18:49:16.242350 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Oct 2 18:49:16.242367 kernel: printk: console [ttyS0] enabled Oct 2 18:49:16.242383 kernel: printk: bootconsole [uart0] disabled Oct 2 18:49:16.242399 kernel: thunder_xcv, ver 1.0 Oct 2 18:49:16.242415 kernel: thunder_bgx, ver 1.0 Oct 2 18:49:16.242431 kernel: nicpf, ver 1.0 Oct 2 18:49:16.242447 kernel: nicvf, ver 1.0 Oct 2 18:49:16.242658 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 18:49:16.242888 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T18:49:15 UTC (1696272555) Oct 2 18:49:16.242916 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 18:49:16.242934 kernel: NET: Registered PF_INET6 protocol family Oct 2 18:49:16.242950 kernel: Segment Routing with IPv6 Oct 2 18:49:16.242966 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 18:49:16.242982 kernel: NET: Registered PF_PACKET protocol family Oct 2 18:49:16.242999 kernel: Key type dns_resolver registered Oct 2 18:49:16.243015 kernel: registered taskstats version 1 Oct 2 18:49:16.243037 kernel: Loading compiled-in X.509 certificates Oct 2 18:49:16.243054 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 18:49:16.243070 kernel: Key type .fscrypt registered Oct 2 18:49:16.243086 kernel: Key type fscrypt-provisioning registered Oct 2 18:49:16.243102 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 18:49:16.243118 kernel: ima: Allocated hash algorithm: sha1 Oct 2 18:49:16.243134 kernel: ima: No architecture policies found Oct 2 18:49:16.243151 kernel: Freeing unused kernel memory: 34560K Oct 2 18:49:16.243167 kernel: Run /init as init process Oct 2 18:49:16.243186 kernel: with arguments: Oct 2 18:49:16.243203 kernel: /init Oct 2 18:49:16.243219 kernel: with environment: Oct 2 18:49:16.243235 kernel: HOME=/ Oct 2 18:49:16.243251 kernel: TERM=linux Oct 2 18:49:16.243267 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 18:49:16.243289 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:49:16.243311 systemd[1]: Detected virtualization amazon. Oct 2 18:49:16.243335 systemd[1]: Detected architecture arm64. Oct 2 18:49:16.243353 systemd[1]: Running in initrd. Oct 2 18:49:16.243371 systemd[1]: No hostname configured, using default hostname. Oct 2 18:49:16.243388 systemd[1]: Hostname set to . Oct 2 18:49:16.243407 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:49:16.243425 systemd[1]: Queued start job for default target initrd.target. Oct 2 18:49:16.243443 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:49:16.243461 systemd[1]: Reached target cryptsetup.target. Oct 2 18:49:16.243484 systemd[1]: Reached target paths.target. Oct 2 18:49:16.243502 systemd[1]: Reached target slices.target. Oct 2 18:49:16.243519 systemd[1]: Reached target swap.target. Oct 2 18:49:16.243537 systemd[1]: Reached target timers.target. Oct 2 18:49:16.243556 systemd[1]: Listening on iscsid.socket. Oct 2 18:49:16.243574 systemd[1]: Listening on iscsiuio.socket. Oct 2 18:49:16.243593 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 18:49:16.243610 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 18:49:16.243632 systemd[1]: Listening on systemd-journald.socket. Oct 2 18:49:16.243650 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:49:16.243667 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:49:16.243685 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:49:16.243704 systemd[1]: Reached target sockets.target. Oct 2 18:49:16.243722 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:49:16.243739 systemd[1]: Finished network-cleanup.service. Oct 2 18:49:16.243757 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 18:49:16.243775 systemd[1]: Starting systemd-journald.service... Oct 2 18:49:16.243797 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:49:16.243815 systemd[1]: Starting systemd-resolved.service... Oct 2 18:49:16.243833 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 18:49:16.243883 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:49:16.243905 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 18:49:16.243923 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 18:49:16.243941 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 18:49:16.243959 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 18:49:16.243977 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 18:49:16.244004 kernel: audit: type=1130 audit(1696272556.218:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.244026 systemd-journald[308]: Journal started Oct 2 18:49:16.244134 systemd-journald[308]: Runtime Journal (/run/log/journal/ec22e71ef18785860fb502c66e3c7906) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:49:16.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.195939 systemd-modules-load[309]: Inserted module 'overlay' Oct 2 18:49:16.262814 systemd[1]: Started systemd-journald.service. Oct 2 18:49:16.262917 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 18:49:16.262945 kernel: Bridge firewalling registered Oct 2 18:49:16.256212 systemd-modules-load[309]: Inserted module 'br_netfilter' Oct 2 18:49:16.258536 systemd-resolved[310]: Positive Trust Anchors: Oct 2 18:49:16.258551 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:49:16.258605 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:49:16.283876 kernel: SCSI subsystem initialized Oct 2 18:49:16.299861 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 18:49:16.300475 kernel: device-mapper: uevent: version 1.0.3 Oct 2 18:49:16.303820 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 18:49:16.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.306359 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 18:49:16.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.352938 kernel: audit: type=1130 audit(1696272556.303:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.353001 kernel: audit: type=1130 audit(1696272556.317:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.322101 systemd[1]: Starting dracut-cmdline.service... Oct 2 18:49:16.356277 systemd-modules-load[309]: Inserted module 'dm_multipath' Oct 2 18:49:16.360359 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:49:16.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.365397 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:49:16.381875 kernel: audit: type=1130 audit(1696272556.362:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.410272 dracut-cmdline[326]: dracut-dracut-053 Oct 2 18:49:16.414541 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:49:16.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.428887 kernel: audit: type=1130 audit(1696272556.416:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.436004 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:49:16.693884 kernel: Loading iSCSI transport class v2.0-870. Oct 2 18:49:16.705884 kernel: iscsi: registered transport (tcp) Oct 2 18:49:16.733541 kernel: iscsi: registered transport (qla4xxx) Oct 2 18:49:16.733618 kernel: QLogic iSCSI HBA Driver Oct 2 18:49:16.908595 systemd-resolved[310]: Defaulting to hostname 'linux'. Oct 2 18:49:16.911370 kernel: random: crng init done Oct 2 18:49:16.912574 systemd[1]: Started systemd-resolved.service. Oct 2 18:49:16.928147 kernel: audit: type=1130 audit(1696272556.913:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.914698 systemd[1]: Reached target nss-lookup.target. Oct 2 18:49:16.985159 systemd[1]: Finished dracut-cmdline.service. Oct 2 18:49:16.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:16.992865 systemd[1]: Starting dracut-pre-udev.service... Oct 2 18:49:17.004757 kernel: audit: type=1130 audit(1696272556.987:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:17.087891 kernel: raid6: neonx8 gen() 6385 MB/s Oct 2 18:49:17.105902 kernel: raid6: neonx8 xor() 4486 MB/s Oct 2 18:49:17.123886 kernel: raid6: neonx4 gen() 6410 MB/s Oct 2 18:49:17.141898 kernel: raid6: neonx4 xor() 4606 MB/s Oct 2 18:49:17.159889 kernel: raid6: neonx2 gen() 5756 MB/s Oct 2 18:49:17.177899 kernel: raid6: neonx2 xor() 4332 MB/s Oct 2 18:49:17.195902 kernel: raid6: neonx1 gen() 4454 MB/s Oct 2 18:49:17.213897 kernel: raid6: neonx1 xor() 3528 MB/s Oct 2 18:49:17.231902 kernel: raid6: int64x8 gen() 3421 MB/s Oct 2 18:49:17.249895 kernel: raid6: int64x8 xor() 2029 MB/s Oct 2 18:49:17.267894 kernel: raid6: int64x4 gen() 3833 MB/s Oct 2 18:49:17.285895 kernel: raid6: int64x4 xor() 2157 MB/s Oct 2 18:49:17.303895 kernel: raid6: int64x2 gen() 3606 MB/s Oct 2 18:49:17.321896 kernel: raid6: int64x2 xor() 1913 MB/s Oct 2 18:49:17.339896 kernel: raid6: int64x1 gen() 2752 MB/s Oct 2 18:49:17.359515 kernel: raid6: int64x1 xor() 1434 MB/s Oct 2 18:49:17.359578 kernel: raid6: using algorithm neonx4 gen() 6410 MB/s Oct 2 18:49:17.359613 kernel: raid6: .... xor() 4606 MB/s, rmw enabled Oct 2 18:49:17.361381 kernel: raid6: using neon recovery algorithm Oct 2 18:49:17.380898 kernel: xor: measuring software checksum speed Oct 2 18:49:17.382886 kernel: 8regs : 9315 MB/sec Oct 2 18:49:17.385879 kernel: 32regs : 11139 MB/sec Oct 2 18:49:17.389933 kernel: arm64_neon : 9334 MB/sec Oct 2 18:49:17.389991 kernel: xor: using function: 32regs (11139 MB/sec) Oct 2 18:49:17.481909 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 18:49:17.521524 systemd[1]: Finished dracut-pre-udev.service. Oct 2 18:49:17.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:17.523000 audit: BPF prog-id=7 op=LOAD Oct 2 18:49:17.535348 kernel: audit: type=1130 audit(1696272557.522:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:17.535414 kernel: audit: type=1334 audit(1696272557.523:10): prog-id=7 op=LOAD Oct 2 18:49:17.533336 systemd[1]: Starting systemd-udevd.service... Oct 2 18:49:17.530000 audit: BPF prog-id=8 op=LOAD Oct 2 18:49:17.572133 systemd-udevd[508]: Using default interface naming scheme 'v252'. Oct 2 18:49:17.583221 systemd[1]: Started systemd-udevd.service. Oct 2 18:49:17.590137 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 18:49:17.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:17.655977 dracut-pre-trigger[518]: rd.md=0: removing MD RAID activation Oct 2 18:49:17.772524 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 18:49:17.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:17.777534 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:49:17.893270 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:49:17.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:18.055823 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 2 18:49:18.055936 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Oct 2 18:49:18.065839 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 18:49:18.066226 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 18:49:18.072893 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Oct 2 18:49:18.072970 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 18:49:18.079902 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:1e:da:5b:22:9d Oct 2 18:49:18.084889 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 18:49:18.091213 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 18:49:18.091287 kernel: GPT:9289727 != 16777215 Oct 2 18:49:18.091311 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 18:49:18.094930 kernel: GPT:9289727 != 16777215 Oct 2 18:49:18.094997 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 18:49:18.098509 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:18.103922 (udev-worker)[560]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:18.211921 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (575) Oct 2 18:49:18.257189 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 18:49:18.417575 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 18:49:18.430532 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 18:49:18.447375 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:49:18.462013 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 18:49:18.476517 systemd[1]: Starting disk-uuid.service... Oct 2 18:49:18.499915 disk-uuid[671]: Primary Header is updated. Oct 2 18:49:18.499915 disk-uuid[671]: Secondary Entries is updated. Oct 2 18:49:18.499915 disk-uuid[671]: Secondary Header is updated. Oct 2 18:49:18.508891 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:19.523894 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:19.524544 disk-uuid[672]: The operation has completed successfully. Oct 2 18:49:19.832537 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 18:49:19.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:19.832797 systemd[1]: Finished disk-uuid.service. Oct 2 18:49:19.854667 kernel: kauditd_printk_skb: 4 callbacks suppressed Oct 2 18:49:19.854720 kernel: audit: type=1130 audit(1696272559.835:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:19.856154 kernel: audit: type=1131 audit(1696272559.837:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:19.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:19.840597 systemd[1]: Starting verity-setup.service... Oct 2 18:49:19.899924 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 18:49:20.020346 systemd[1]: Found device dev-mapper-usr.device. Oct 2 18:49:20.030881 systemd[1]: Mounting sysusr-usr.mount... Oct 2 18:49:20.036005 systemd[1]: Finished verity-setup.service. Oct 2 18:49:20.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.046894 kernel: audit: type=1130 audit(1696272560.037:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.132897 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 18:49:20.133457 systemd[1]: Mounted sysusr-usr.mount. Oct 2 18:49:20.136503 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 18:49:20.140500 systemd[1]: Starting ignition-setup.service... Oct 2 18:49:20.145006 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 18:49:20.184159 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:20.184238 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:20.186451 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:20.210908 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:20.245393 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 18:49:20.301344 systemd[1]: Finished ignition-setup.service. Oct 2 18:49:20.306299 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 18:49:20.323065 kernel: audit: type=1130 audit(1696272560.302:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.540987 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 18:49:20.567389 kernel: audit: type=1130 audit(1696272560.539:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.568602 kernel: audit: type=1334 audit(1696272560.555:20): prog-id=9 op=LOAD Oct 2 18:49:20.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.555000 audit: BPF prog-id=9 op=LOAD Oct 2 18:49:20.557946 systemd[1]: Starting systemd-networkd.service... Oct 2 18:49:20.620106 systemd-networkd[1185]: lo: Link UP Oct 2 18:49:20.620131 systemd-networkd[1185]: lo: Gained carrier Oct 2 18:49:20.624311 systemd-networkd[1185]: Enumeration completed Oct 2 18:49:20.625098 systemd-networkd[1185]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:49:20.625708 systemd[1]: Started systemd-networkd.service. Oct 2 18:49:20.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.633414 systemd[1]: Reached target network.target. Oct 2 18:49:20.644528 kernel: audit: type=1130 audit(1696272560.632:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.646321 systemd[1]: Starting iscsiuio.service... Oct 2 18:49:20.653613 systemd-networkd[1185]: eth0: Link UP Oct 2 18:49:20.655269 systemd-networkd[1185]: eth0: Gained carrier Oct 2 18:49:20.669462 systemd[1]: Started iscsiuio.service. Oct 2 18:49:20.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.683350 systemd[1]: Starting iscsid.service... Oct 2 18:49:20.686550 kernel: audit: type=1130 audit(1696272560.670:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.693115 systemd-networkd[1185]: eth0: DHCPv4 address 172.31.28.180/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:49:20.700639 iscsid[1190]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:49:20.700639 iscsid[1190]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 18:49:20.700639 iscsid[1190]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 18:49:20.700639 iscsid[1190]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 18:49:20.700639 iscsid[1190]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:49:20.745297 kernel: audit: type=1130 audit(1696272560.718:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.745499 iscsid[1190]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 18:49:20.717758 systemd[1]: Started iscsid.service. Oct 2 18:49:20.730151 systemd[1]: Starting dracut-initqueue.service... Oct 2 18:49:20.779541 systemd[1]: Finished dracut-initqueue.service. Oct 2 18:49:20.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.783903 systemd[1]: Reached target remote-fs-pre.target. Oct 2 18:49:20.816440 kernel: audit: type=1130 audit(1696272560.782:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.793217 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:49:20.795233 systemd[1]: Reached target remote-fs.target. Oct 2 18:49:20.798761 systemd[1]: Starting dracut-pre-mount.service... Oct 2 18:49:20.839071 systemd[1]: Finished dracut-pre-mount.service. Oct 2 18:49:20.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.189423 ignition[1111]: Ignition 2.14.0 Oct 2 18:49:21.189451 ignition[1111]: Stage: fetch-offline Oct 2 18:49:21.189919 ignition[1111]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:21.190008 ignition[1111]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:21.212595 ignition[1111]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:21.215505 ignition[1111]: Ignition finished successfully Oct 2 18:49:21.218709 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 18:49:21.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.223974 systemd[1]: Starting ignition-fetch.service... Oct 2 18:49:21.256173 ignition[1209]: Ignition 2.14.0 Oct 2 18:49:21.256203 ignition[1209]: Stage: fetch Oct 2 18:49:21.256561 ignition[1209]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:21.256621 ignition[1209]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:21.272213 ignition[1209]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:21.274584 ignition[1209]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:21.282525 ignition[1209]: INFO : PUT result: OK Oct 2 18:49:21.286253 ignition[1209]: DEBUG : parsed url from cmdline: "" Oct 2 18:49:21.286253 ignition[1209]: INFO : no config URL provided Oct 2 18:49:21.286253 ignition[1209]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 18:49:21.292809 ignition[1209]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 18:49:21.292809 ignition[1209]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:21.292809 ignition[1209]: INFO : PUT result: OK Oct 2 18:49:21.292809 ignition[1209]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 18:49:21.301832 ignition[1209]: INFO : GET result: OK Oct 2 18:49:21.301832 ignition[1209]: DEBUG : parsing config with SHA512: a54ec2bfbe45351cef05d5c603829aed189492d70cd374589c7cac1e8942869e9585574ecf3f27e86c1b514e757a18d4c01318d82347ada46c8b3fe1b98fefc6 Oct 2 18:49:21.344924 unknown[1209]: fetched base config from "system" Oct 2 18:49:21.346258 unknown[1209]: fetched base config from "system" Oct 2 18:49:21.346280 unknown[1209]: fetched user config from "aws" Oct 2 18:49:21.349740 ignition[1209]: fetch: fetch complete Oct 2 18:49:21.349755 ignition[1209]: fetch: fetch passed Oct 2 18:49:21.349879 ignition[1209]: Ignition finished successfully Oct 2 18:49:21.357171 systemd[1]: Finished ignition-fetch.service. Oct 2 18:49:21.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.362034 systemd[1]: Starting ignition-kargs.service... Oct 2 18:49:21.396996 ignition[1215]: Ignition 2.14.0 Oct 2 18:49:21.397028 ignition[1215]: Stage: kargs Oct 2 18:49:21.397410 ignition[1215]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:21.397473 ignition[1215]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:21.414406 ignition[1215]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:21.416903 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:21.420756 ignition[1215]: INFO : PUT result: OK Oct 2 18:49:21.426205 ignition[1215]: kargs: kargs passed Oct 2 18:49:21.426354 ignition[1215]: Ignition finished successfully Oct 2 18:49:21.430732 systemd[1]: Finished ignition-kargs.service. Oct 2 18:49:21.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.435151 systemd[1]: Starting ignition-disks.service... Oct 2 18:49:21.467904 ignition[1221]: Ignition 2.14.0 Oct 2 18:49:21.467936 ignition[1221]: Stage: disks Oct 2 18:49:21.468336 ignition[1221]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:21.468402 ignition[1221]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:21.483655 ignition[1221]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:21.486560 ignition[1221]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:21.490445 ignition[1221]: INFO : PUT result: OK Oct 2 18:49:21.496159 ignition[1221]: disks: disks passed Oct 2 18:49:21.496288 ignition[1221]: Ignition finished successfully Oct 2 18:49:21.500540 systemd[1]: Finished ignition-disks.service. Oct 2 18:49:21.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.502614 systemd[1]: Reached target initrd-root-device.target. Oct 2 18:49:21.505079 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:49:21.514996 systemd[1]: Reached target local-fs.target. Oct 2 18:49:21.517149 systemd[1]: Reached target sysinit.target. Oct 2 18:49:21.521594 systemd[1]: Reached target basic.target. Oct 2 18:49:21.531957 systemd[1]: Starting systemd-fsck-root.service... Oct 2 18:49:21.595988 systemd-fsck[1229]: ROOT: clean, 603/553520 files, 56011/553472 blocks Oct 2 18:49:21.605385 systemd[1]: Finished systemd-fsck-root.service. Oct 2 18:49:21.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.610011 systemd[1]: Mounting sysroot.mount... Oct 2 18:49:21.635592 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 18:49:21.636408 systemd[1]: Mounted sysroot.mount. Oct 2 18:49:21.638296 systemd[1]: Reached target initrd-root-fs.target. Oct 2 18:49:21.652774 systemd[1]: Mounting sysroot-usr.mount... Oct 2 18:49:21.656763 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 18:49:21.656911 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 18:49:21.656989 systemd[1]: Reached target ignition-diskful.target. Oct 2 18:49:21.675991 systemd[1]: Mounted sysroot-usr.mount. Oct 2 18:49:21.690667 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:49:21.693965 systemd[1]: Starting initrd-setup-root.service... Oct 2 18:49:21.731165 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1246) Oct 2 18:49:21.737055 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:21.737128 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:21.739362 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:21.745872 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:21.750235 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:49:21.765636 initrd-setup-root[1251]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 18:49:21.800298 initrd-setup-root[1277]: cut: /sysroot/etc/group: No such file or directory Oct 2 18:49:21.821483 initrd-setup-root[1285]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 18:49:21.842708 initrd-setup-root[1293]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 18:49:22.038070 systemd-networkd[1185]: eth0: Gained IPv6LL Oct 2 18:49:22.098296 systemd[1]: Finished initrd-setup-root.service. Oct 2 18:49:22.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:22.102562 systemd[1]: Starting ignition-mount.service... Oct 2 18:49:22.105980 systemd[1]: Starting sysroot-boot.service... Oct 2 18:49:22.145256 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 18:49:22.145443 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 18:49:22.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:22.173997 systemd[1]: Finished sysroot-boot.service. Oct 2 18:49:22.198554 ignition[1314]: INFO : Ignition 2.14.0 Oct 2 18:49:22.198554 ignition[1314]: INFO : Stage: mount Oct 2 18:49:22.202102 ignition[1314]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:22.202102 ignition[1314]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:22.223700 ignition[1314]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:22.226773 ignition[1314]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:22.229886 ignition[1314]: INFO : PUT result: OK Oct 2 18:49:22.235999 ignition[1314]: INFO : mount: mount passed Oct 2 18:49:22.237962 ignition[1314]: INFO : Ignition finished successfully Oct 2 18:49:22.240993 systemd[1]: Finished ignition-mount.service. Oct 2 18:49:22.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:22.244361 systemd[1]: Starting ignition-files.service... Oct 2 18:49:22.269131 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:49:22.293898 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1321) Oct 2 18:49:22.299726 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:22.299805 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:22.299831 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:22.308884 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:22.314615 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:49:22.351285 ignition[1340]: INFO : Ignition 2.14.0 Oct 2 18:49:22.351285 ignition[1340]: INFO : Stage: files Oct 2 18:49:22.354973 ignition[1340]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:22.354973 ignition[1340]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:22.373927 ignition[1340]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:22.376569 ignition[1340]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:22.380691 ignition[1340]: INFO : PUT result: OK Oct 2 18:49:22.385768 ignition[1340]: DEBUG : files: compiled without relabeling support, skipping Oct 2 18:49:22.390288 ignition[1340]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 18:49:22.390288 ignition[1340]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 18:49:22.439355 ignition[1340]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 18:49:22.445252 ignition[1340]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 18:49:22.449166 unknown[1340]: wrote ssh authorized keys file for user: core Oct 2 18:49:22.451550 ignition[1340]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 18:49:22.455257 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 18:49:22.459339 ignition[1340]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 18:49:22.627715 ignition[1340]: INFO : GET result: OK Oct 2 18:49:23.174717 ignition[1340]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 18:49:23.179861 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 18:49:23.179861 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 18:49:23.179861 ignition[1340]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 18:49:23.271769 ignition[1340]: INFO : GET result: OK Oct 2 18:49:23.558151 ignition[1340]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 18:49:23.564067 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 18:49:23.564067 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:49:23.564067 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:23.578050 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1345) Oct 2 18:49:23.578088 ignition[1340]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem410013719" Oct 2 18:49:23.578088 ignition[1340]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem410013719": device or resource busy Oct 2 18:49:23.578088 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem410013719", trying btrfs: device or resource busy Oct 2 18:49:23.578088 ignition[1340]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem410013719" Oct 2 18:49:23.593735 ignition[1340]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem410013719" Oct 2 18:49:23.602482 ignition[1340]: INFO : op(3): [started] unmounting "/mnt/oem410013719" Oct 2 18:49:23.610312 ignition[1340]: INFO : op(3): [finished] unmounting "/mnt/oem410013719" Oct 2 18:49:23.610312 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:49:23.610312 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:49:23.610312 ignition[1340]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Oct 2 18:49:23.609587 systemd[1]: mnt-oem410013719.mount: Deactivated successfully. Oct 2 18:49:23.698287 ignition[1340]: INFO : GET result: OK Oct 2 18:49:24.645721 ignition[1340]: DEBUG : file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Oct 2 18:49:24.650952 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:49:24.650952 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:49:24.650952 ignition[1340]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Oct 2 18:49:24.713053 ignition[1340]: INFO : GET result: OK Oct 2 18:49:26.808345 ignition[1340]: DEBUG : file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Oct 2 18:49:26.813613 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:49:26.813613 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:49:26.813613 ignition[1340]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Oct 2 18:49:26.877458 ignition[1340]: INFO : GET result: OK Oct 2 18:49:27.948163 ignition[1340]: DEBUG : file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Oct 2 18:49:27.953398 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:49:27.953398 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:49:27.953398 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:49:27.953398 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 18:49:27.967464 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 18:49:27.971174 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:49:27.971174 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:49:27.978262 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:49:27.978262 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:27.991792 ignition[1340]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3020423818" Oct 2 18:49:27.994781 ignition[1340]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3020423818": device or resource busy Oct 2 18:49:27.994781 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3020423818", trying btrfs: device or resource busy Oct 2 18:49:27.994781 ignition[1340]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3020423818" Oct 2 18:49:27.994781 ignition[1340]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3020423818" Oct 2 18:49:28.012502 ignition[1340]: INFO : op(6): [started] unmounting "/mnt/oem3020423818" Oct 2 18:49:28.015016 ignition[1340]: INFO : op(6): [finished] unmounting "/mnt/oem3020423818" Oct 2 18:49:28.015016 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:49:28.015016 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:49:28.015016 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:28.015442 systemd[1]: mnt-oem3020423818.mount: Deactivated successfully. Oct 2 18:49:28.045870 ignition[1340]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem561019752" Oct 2 18:49:28.048924 ignition[1340]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem561019752": device or resource busy Oct 2 18:49:28.048924 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem561019752", trying btrfs: device or resource busy Oct 2 18:49:28.048924 ignition[1340]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem561019752" Oct 2 18:49:28.058891 ignition[1340]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem561019752" Oct 2 18:49:28.058891 ignition[1340]: INFO : op(9): [started] unmounting "/mnt/oem561019752" Oct 2 18:49:28.063978 ignition[1340]: INFO : op(9): [finished] unmounting "/mnt/oem561019752" Oct 2 18:49:28.063978 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:49:28.063978 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:49:28.063978 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:28.089303 ignition[1340]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583090844" Oct 2 18:49:28.089303 ignition[1340]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583090844": device or resource busy Oct 2 18:49:28.089303 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem583090844", trying btrfs: device or resource busy Oct 2 18:49:28.089303 ignition[1340]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583090844" Oct 2 18:49:28.104278 ignition[1340]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583090844" Oct 2 18:49:28.104278 ignition[1340]: INFO : op(c): [started] unmounting "/mnt/oem583090844" Oct 2 18:49:28.104278 ignition[1340]: INFO : op(c): [finished] unmounting "/mnt/oem583090844" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(11): [started] processing unit "nvidia.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(11): [finished] processing unit "nvidia.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(12): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(12): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:49:28.104278 ignition[1340]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(1b): [started] setting preset to enabled for "nvidia.service" Oct 2 18:49:28.165974 ignition[1340]: INFO : files: op(1b): [finished] setting preset to enabled for "nvidia.service" Oct 2 18:49:28.203802 ignition[1340]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:49:28.203802 ignition[1340]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:49:28.203802 ignition[1340]: INFO : files: files passed Oct 2 18:49:28.203802 ignition[1340]: INFO : Ignition finished successfully Oct 2 18:49:28.215863 systemd[1]: Finished ignition-files.service. Oct 2 18:49:28.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.221797 kernel: kauditd_printk_skb: 9 callbacks suppressed Oct 2 18:49:28.221839 kernel: audit: type=1130 audit(1696272568.217:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.232323 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 18:49:28.236510 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 18:49:28.238182 systemd[1]: Starting ignition-quench.service... Oct 2 18:49:28.252458 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 18:49:28.254575 systemd[1]: Finished ignition-quench.service. Oct 2 18:49:28.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.273977 kernel: audit: type=1130 audit(1696272568.256:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.274031 kernel: audit: type=1131 audit(1696272568.256:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.295331 initrd-setup-root-after-ignition[1366]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 18:49:28.300216 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 18:49:28.312134 kernel: audit: type=1130 audit(1696272568.300:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.310822 systemd[1]: Reached target ignition-complete.target. Oct 2 18:49:28.316819 systemd[1]: Starting initrd-parse-etc.service... Oct 2 18:49:28.366441 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 18:49:28.368510 systemd[1]: Finished initrd-parse-etc.service. Oct 2 18:49:28.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.379891 kernel: audit: type=1130 audit(1696272568.369:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.379976 systemd[1]: Reached target initrd-fs.target. Oct 2 18:49:28.390315 kernel: audit: type=1131 audit(1696272568.378:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.390465 systemd[1]: Reached target initrd.target. Oct 2 18:49:28.393416 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 18:49:28.397520 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 18:49:28.437589 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 18:49:28.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.442376 systemd[1]: Starting initrd-cleanup.service... Oct 2 18:49:28.451720 kernel: audit: type=1130 audit(1696272568.439:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.478295 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 18:49:28.480290 systemd[1]: Finished initrd-cleanup.service. Oct 2 18:49:28.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.492884 kernel: audit: type=1130 audit(1696272568.481:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.492932 kernel: audit: type=1131 audit(1696272568.489:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.491946 systemd[1]: Stopped target nss-lookup.target. Oct 2 18:49:28.500828 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 18:49:28.518329 kernel: audit: type=1131 audit(1696272568.505:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.502713 systemd[1]: Stopped target timers.target. Oct 2 18:49:28.504311 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 18:49:28.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.504413 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 18:49:28.507719 systemd[1]: Stopped target initrd.target. Oct 2 18:49:28.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.516559 systemd[1]: Stopped target basic.target. Oct 2 18:49:28.519864 systemd[1]: Stopped target ignition-complete.target. Oct 2 18:49:28.521715 systemd[1]: Stopped target ignition-diskful.target. Oct 2 18:49:28.523515 systemd[1]: Stopped target initrd-root-device.target. Oct 2 18:49:28.525388 systemd[1]: Stopped target remote-fs.target. Oct 2 18:49:28.527026 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 18:49:28.530228 systemd[1]: Stopped target sysinit.target. Oct 2 18:49:28.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.531896 systemd[1]: Stopped target local-fs.target. Oct 2 18:49:28.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.604664 ignition[1379]: INFO : Ignition 2.14.0 Oct 2 18:49:28.604664 ignition[1379]: INFO : Stage: umount Oct 2 18:49:28.604664 ignition[1379]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:28.604664 ignition[1379]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:28.533553 systemd[1]: Stopped target local-fs-pre.target. Oct 2 18:49:28.623800 ignition[1379]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:28.623800 ignition[1379]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:28.535280 systemd[1]: Stopped target swap.target. Oct 2 18:49:28.630763 ignition[1379]: INFO : PUT result: OK Oct 2 18:49:28.536786 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 18:49:28.536905 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 18:49:28.538697 systemd[1]: Stopped target cryptsetup.target. Oct 2 18:49:28.540475 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 18:49:28.540654 systemd[1]: Stopped dracut-initqueue.service. Oct 2 18:49:28.544128 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 18:49:28.544212 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 18:49:28.546377 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 18:49:28.546540 systemd[1]: Stopped ignition-files.service. Oct 2 18:49:28.550915 systemd[1]: Stopping ignition-mount.service... Oct 2 18:49:28.556885 systemd[1]: Stopping sysroot-boot.service... Oct 2 18:49:28.580031 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 18:49:28.580190 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 18:49:28.588085 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 18:49:28.588189 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 18:49:28.665035 ignition[1379]: INFO : umount: umount passed Oct 2 18:49:28.665035 ignition[1379]: INFO : Ignition finished successfully Oct 2 18:49:28.666135 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 18:49:28.666377 systemd[1]: Stopped ignition-mount.service. Oct 2 18:49:28.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.694200 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 18:49:28.696420 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 18:49:28.696535 systemd[1]: Stopped ignition-disks.service. Oct 2 18:49:28.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.700083 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 18:49:28.700170 systemd[1]: Stopped ignition-kargs.service. Oct 2 18:49:28.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.710513 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 18:49:28.710607 systemd[1]: Stopped ignition-fetch.service. Oct 2 18:49:28.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.715732 systemd[1]: Stopped target network.target. Oct 2 18:49:28.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.717333 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 18:49:28.717423 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 18:49:28.719301 systemd[1]: Stopped target paths.target. Oct 2 18:49:28.720806 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 18:49:28.720978 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 18:49:28.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.731651 systemd[1]: Stopped target slices.target. Oct 2 18:49:28.731761 systemd[1]: Stopped target sockets.target. Oct 2 18:49:28.736958 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 18:49:28.737016 systemd[1]: Closed iscsid.socket. Oct 2 18:49:28.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.763000 audit: BPF prog-id=6 op=UNLOAD Oct 2 18:49:28.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.738493 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 18:49:28.738548 systemd[1]: Closed iscsiuio.socket. Oct 2 18:49:28.740010 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 18:49:28.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.740093 systemd[1]: Stopped ignition-setup.service. Oct 2 18:49:28.742074 systemd[1]: Stopping systemd-networkd.service... Oct 2 18:49:28.744568 systemd[1]: Stopping systemd-resolved.service... Oct 2 18:49:28.759430 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 18:49:28.759652 systemd[1]: Stopped systemd-resolved.service. Oct 2 18:49:28.766124 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 18:49:28.766326 systemd[1]: Stopped sysroot-boot.service. Oct 2 18:49:28.768762 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 18:49:28.768995 systemd[1]: Stopped initrd-setup-root.service. Oct 2 18:49:28.791928 systemd-networkd[1185]: eth0: DHCPv6 lease lost Oct 2 18:49:28.796115 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 18:49:28.798170 systemd[1]: Stopped systemd-networkd.service. Oct 2 18:49:28.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.799000 audit: BPF prog-id=9 op=UNLOAD Oct 2 18:49:28.802007 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 18:49:28.802105 systemd[1]: Closed systemd-networkd.socket. Oct 2 18:49:28.808454 systemd[1]: Stopping network-cleanup.service... Oct 2 18:49:28.817970 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 18:49:28.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.818105 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 18:49:28.822690 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 18:49:28.822774 systemd[1]: Stopped systemd-sysctl.service. Oct 2 18:49:28.832014 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 18:49:28.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.832105 systemd[1]: Stopped systemd-modules-load.service. Oct 2 18:49:28.835285 systemd[1]: Stopping systemd-udevd.service... Oct 2 18:49:28.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.847467 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 18:49:28.847952 systemd[1]: Stopped network-cleanup.service. Oct 2 18:49:28.854781 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 18:49:28.858447 systemd[1]: Stopped systemd-udevd.service. Oct 2 18:49:28.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.862074 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 18:49:28.862174 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 18:49:28.867544 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 18:49:28.867637 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 18:49:28.871365 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 18:49:28.875025 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 18:49:28.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.878275 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 18:49:28.878360 systemd[1]: Stopped dracut-cmdline.service. Oct 2 18:49:28.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.881829 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 18:49:28.885526 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 18:49:28.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.890310 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 18:49:28.910982 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 18:49:28.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.911102 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 18:49:28.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.919233 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 18:49:28.919328 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 18:49:28.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:28.922655 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 18:49:28.922733 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 18:49:28.925508 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 18:49:28.925711 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 18:49:28.929087 systemd[1]: Reached target initrd-switch-root.target. Oct 2 18:49:28.932699 systemd[1]: Starting initrd-switch-root.service... Oct 2 18:49:28.959107 systemd[1]: Switching root. Oct 2 18:49:28.992392 iscsid[1190]: iscsid shutting down. Oct 2 18:49:28.994181 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Oct 2 18:49:28.994283 systemd-journald[308]: Journal stopped Oct 2 18:49:35.551425 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 18:49:35.560908 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 18:49:35.560971 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 18:49:35.561004 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 18:49:35.561037 kernel: SELinux: policy capability open_perms=1 Oct 2 18:49:35.561136 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 18:49:35.561170 kernel: SELinux: policy capability always_check_network=0 Oct 2 18:49:35.561267 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 18:49:35.561301 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 18:49:35.561336 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 18:49:35.561366 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 18:49:35.561405 systemd[1]: Successfully loaded SELinux policy in 87.829ms. Oct 2 18:49:35.561688 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.196ms. Oct 2 18:49:35.561752 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:49:35.561791 systemd[1]: Detected virtualization amazon. Oct 2 18:49:35.561822 systemd[1]: Detected architecture arm64. Oct 2 18:49:35.561889 systemd[1]: Detected first boot. Oct 2 18:49:35.561998 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:49:35.562038 systemd[1]: Populated /etc with preset unit settings. Oct 2 18:49:35.562072 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:49:35.562111 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:49:35.562149 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:49:35.562185 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 18:49:35.562219 kernel: audit: type=1334 audit(1696272574.953:82): prog-id=12 op=LOAD Oct 2 18:49:35.562248 kernel: audit: type=1334 audit(1696272574.956:83): prog-id=3 op=UNLOAD Oct 2 18:49:35.562280 kernel: audit: type=1334 audit(1696272574.959:84): prog-id=13 op=LOAD Oct 2 18:49:35.562313 kernel: audit: type=1334 audit(1696272574.962:85): prog-id=14 op=LOAD Oct 2 18:49:35.562344 kernel: audit: type=1334 audit(1696272574.962:86): prog-id=4 op=UNLOAD Oct 2 18:49:35.562375 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 18:49:35.562404 kernel: audit: type=1334 audit(1696272574.962:87): prog-id=5 op=UNLOAD Oct 2 18:49:35.562438 systemd[1]: Stopped iscsiuio.service. Oct 2 18:49:35.562471 kernel: audit: type=1131 audit(1696272574.967:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.562502 kernel: audit: type=1334 audit(1696272574.976:89): prog-id=12 op=UNLOAD Oct 2 18:49:35.562537 kernel: audit: type=1131 audit(1696272574.988:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.562571 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 18:49:35.562604 systemd[1]: Stopped iscsid.service. Oct 2 18:49:35.562639 kernel: audit: type=1131 audit(1696272575.002:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.562670 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 18:49:35.562701 systemd[1]: Stopped initrd-switch-root.service. Oct 2 18:49:35.562733 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 18:49:35.562764 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 18:49:35.562802 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 18:49:35.562833 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 18:49:35.567561 systemd[1]: Created slice system-getty.slice. Oct 2 18:49:35.567609 systemd[1]: Created slice system-modprobe.slice. Oct 2 18:49:35.567643 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 18:49:35.567678 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 18:49:35.567712 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 18:49:35.567745 systemd[1]: Created slice user.slice. Oct 2 18:49:35.567775 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:49:35.567812 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 18:49:35.567868 systemd[1]: Set up automount boot.automount. Oct 2 18:49:35.567909 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 18:49:35.567940 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 18:49:35.567971 systemd[1]: Stopped target initrd-fs.target. Oct 2 18:49:35.568002 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 18:49:35.568034 systemd[1]: Reached target integritysetup.target. Oct 2 18:49:35.568066 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:49:35.568100 systemd[1]: Reached target remote-fs.target. Oct 2 18:49:35.568135 systemd[1]: Reached target slices.target. Oct 2 18:49:35.568165 systemd[1]: Reached target swap.target. Oct 2 18:49:35.568197 systemd[1]: Reached target torcx.target. Oct 2 18:49:35.568227 systemd[1]: Reached target veritysetup.target. Oct 2 18:49:35.568258 systemd[1]: Listening on systemd-coredump.socket. Oct 2 18:49:35.568293 systemd[1]: Listening on systemd-initctl.socket. Oct 2 18:49:35.568327 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:49:35.568360 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:49:35.568391 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:49:35.568422 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 18:49:35.568458 systemd[1]: Mounting dev-hugepages.mount... Oct 2 18:49:35.568488 systemd[1]: Mounting dev-mqueue.mount... Oct 2 18:49:35.568520 systemd[1]: Mounting media.mount... Oct 2 18:49:35.568549 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 18:49:35.568598 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 18:49:35.568633 systemd[1]: Mounting tmp.mount... Oct 2 18:49:35.568663 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 18:49:35.568693 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 18:49:35.568725 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:49:35.568761 systemd[1]: Starting modprobe@configfs.service... Oct 2 18:49:35.568795 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 18:49:35.568827 systemd[1]: Starting modprobe@drm.service... Oct 2 18:49:35.568881 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 18:49:35.568914 systemd[1]: Starting modprobe@fuse.service... Oct 2 18:49:35.568944 systemd[1]: Starting modprobe@loop.service... Oct 2 18:49:35.568975 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 18:49:35.569008 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 18:49:35.569038 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 18:49:35.569074 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 18:49:35.569104 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 18:49:35.569133 systemd[1]: Stopped systemd-journald.service. Oct 2 18:49:35.569163 systemd[1]: Starting systemd-journald.service... Oct 2 18:49:35.569192 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:49:35.569223 systemd[1]: Starting systemd-network-generator.service... Oct 2 18:49:35.569253 systemd[1]: Starting systemd-remount-fs.service... Oct 2 18:49:35.569285 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:49:35.569317 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 18:49:35.569352 systemd[1]: Stopped verity-setup.service. Oct 2 18:49:35.569384 systemd[1]: Mounted dev-hugepages.mount. Oct 2 18:49:35.569414 systemd[1]: Mounted dev-mqueue.mount. Oct 2 18:49:35.569444 systemd[1]: Mounted media.mount. Oct 2 18:49:35.569473 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 18:49:35.569502 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 18:49:35.569534 systemd[1]: Mounted tmp.mount. Oct 2 18:49:35.569567 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:49:35.569601 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 18:49:35.569635 systemd[1]: Finished modprobe@configfs.service. Oct 2 18:49:35.569669 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 18:49:35.569701 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 18:49:35.569734 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 18:49:35.569764 systemd[1]: Finished modprobe@drm.service. Oct 2 18:49:35.569887 systemd[1]: Finished systemd-network-generator.service. Oct 2 18:49:35.569920 systemd[1]: Reached target network-pre.target. Oct 2 18:49:35.569950 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 18:49:35.569982 systemd[1]: Finished systemd-remount-fs.service. Oct 2 18:49:35.570012 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 18:49:35.570042 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 18:49:35.570073 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 18:49:35.570106 systemd[1]: Starting systemd-random-seed.service... Oct 2 18:49:35.570140 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 18:49:35.570180 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 18:49:35.570210 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:49:35.570242 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 18:49:35.570272 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:49:35.570301 kernel: loop: module loaded Oct 2 18:49:35.570334 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 18:49:35.570366 systemd[1]: Finished modprobe@loop.service. Oct 2 18:49:35.570408 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 18:49:35.570442 kernel: fuse: init (API version 7.34) Oct 2 18:49:35.570471 systemd[1]: Finished systemd-random-seed.service. Oct 2 18:49:35.570509 systemd-journald[1490]: Journal started Oct 2 18:49:35.570615 systemd-journald[1490]: Runtime Journal (/run/log/journal/ec22e71ef18785860fb502c66e3c7906) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:49:35.586981 systemd[1]: Reached target first-boot-complete.target. Oct 2 18:49:35.587061 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 18:49:35.587110 systemd[1]: Finished modprobe@fuse.service. Oct 2 18:49:29.939000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 18:49:30.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:49:30.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:49:30.169000 audit: BPF prog-id=10 op=LOAD Oct 2 18:49:30.169000 audit: BPF prog-id=10 op=UNLOAD Oct 2 18:49:30.169000 audit: BPF prog-id=11 op=LOAD Oct 2 18:49:30.169000 audit: BPF prog-id=11 op=UNLOAD Oct 2 18:49:34.953000 audit: BPF prog-id=12 op=LOAD Oct 2 18:49:34.956000 audit: BPF prog-id=3 op=UNLOAD Oct 2 18:49:34.959000 audit: BPF prog-id=13 op=LOAD Oct 2 18:49:34.962000 audit: BPF prog-id=14 op=LOAD Oct 2 18:49:34.962000 audit: BPF prog-id=4 op=UNLOAD Oct 2 18:49:34.962000 audit: BPF prog-id=5 op=UNLOAD Oct 2 18:49:34.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:34.976000 audit: BPF prog-id=12 op=UNLOAD Oct 2 18:49:34.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.592032 systemd[1]: Started systemd-journald.service. Oct 2 18:49:35.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.315000 audit: BPF prog-id=15 op=LOAD Oct 2 18:49:35.316000 audit: BPF prog-id=16 op=LOAD Oct 2 18:49:35.316000 audit: BPF prog-id=17 op=LOAD Oct 2 18:49:35.316000 audit: BPF prog-id=13 op=UNLOAD Oct 2 18:49:35.316000 audit: BPF prog-id=14 op=UNLOAD Oct 2 18:49:35.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.543000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 18:49:35.543000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffee7560a0 a2=4000 a3=1 items=0 ppid=1 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:35.543000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 18:49:35.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:30.465229 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:49:34.951294 systemd[1]: Queued start job for default target multi-user.target. Oct 2 18:49:30.480331 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:49:34.967694 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 18:49:30.480384 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:49:35.594840 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 18:49:30.480453 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 18:49:35.599077 systemd[1]: Starting systemd-journal-flush.service... Oct 2 18:49:30.480479 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 18:49:30.480680 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 18:49:30.480713 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 18:49:30.481346 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 18:49:35.615345 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 18:49:30.481427 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:49:30.481463 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:49:30.482490 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 18:49:30.482576 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 18:49:30.482623 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 18:49:30.482665 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 18:49:30.482712 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 18:49:30.482750 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 18:49:34.036326 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:34.036920 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:34.037170 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:34.037634 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:34.037799 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 18:49:34.037983 /usr/lib/systemd/system-generators/torcx-generator[1412]: time="2023-10-02T18:49:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 18:49:35.645161 systemd-journald[1490]: Time spent on flushing to /var/log/journal/ec22e71ef18785860fb502c66e3c7906 is 83.921ms for 1140 entries. Oct 2 18:49:35.645161 systemd-journald[1490]: System Journal (/var/log/journal/ec22e71ef18785860fb502c66e3c7906) is 8.0M, max 195.6M, 187.6M free. Oct 2 18:49:35.746745 systemd-journald[1490]: Received client request to flush runtime journal. Oct 2 18:49:35.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.662107 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:49:35.755799 systemd[1]: Finished systemd-journal-flush.service. Oct 2 18:49:35.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.818924 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:49:35.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.823392 systemd[1]: Starting systemd-udev-settle.service... Oct 2 18:49:35.836645 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 18:49:35.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:35.841098 systemd[1]: Starting systemd-sysusers.service... Oct 2 18:49:35.861444 udevadm[1529]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 18:49:36.004542 systemd[1]: Finished systemd-sysusers.service. Oct 2 18:49:36.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:36.008932 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 18:49:36.125497 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 18:49:36.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:36.561148 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 18:49:36.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:36.564000 audit: BPF prog-id=18 op=LOAD Oct 2 18:49:36.564000 audit: BPF prog-id=19 op=LOAD Oct 2 18:49:36.564000 audit: BPF prog-id=7 op=UNLOAD Oct 2 18:49:36.564000 audit: BPF prog-id=8 op=UNLOAD Oct 2 18:49:36.567583 systemd[1]: Starting systemd-udevd.service... Oct 2 18:49:36.613378 systemd-udevd[1534]: Using default interface naming scheme 'v252'. Oct 2 18:49:36.659192 systemd[1]: Started systemd-udevd.service. Oct 2 18:49:36.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:36.660000 audit: BPF prog-id=20 op=LOAD Oct 2 18:49:36.664094 systemd[1]: Starting systemd-networkd.service... Oct 2 18:49:36.676000 audit: BPF prog-id=21 op=LOAD Oct 2 18:49:36.676000 audit: BPF prog-id=22 op=LOAD Oct 2 18:49:36.677000 audit: BPF prog-id=23 op=LOAD Oct 2 18:49:36.680054 systemd[1]: Starting systemd-userdbd.service... Oct 2 18:49:36.816376 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 18:49:36.860898 (udev-worker)[1546]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:36.866018 systemd[1]: Started systemd-userdbd.service. Oct 2 18:49:36.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.068039 systemd-networkd[1540]: lo: Link UP Oct 2 18:49:37.068064 systemd-networkd[1540]: lo: Gained carrier Oct 2 18:49:37.069047 systemd-networkd[1540]: Enumeration completed Oct 2 18:49:37.069278 systemd[1]: Started systemd-networkd.service. Oct 2 18:49:37.069331 systemd-networkd[1540]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:49:37.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.073925 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 18:49:37.081078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:49:37.088229 systemd-networkd[1540]: eth0: Link UP Oct 2 18:49:37.088553 systemd-networkd[1540]: eth0: Gained carrier Oct 2 18:49:37.095873 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1541) Oct 2 18:49:37.124265 systemd-networkd[1540]: eth0: DHCPv4 address 172.31.28.180/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:49:37.327777 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:49:37.331738 systemd[1]: Finished systemd-udev-settle.service. Oct 2 18:49:37.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.337145 systemd[1]: Starting lvm2-activation-early.service... Oct 2 18:49:37.376403 lvm[1653]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:49:37.419037 systemd[1]: Finished lvm2-activation-early.service. Oct 2 18:49:37.421252 systemd[1]: Reached target cryptsetup.target. Oct 2 18:49:37.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.426002 systemd[1]: Starting lvm2-activation.service... Oct 2 18:49:37.440292 lvm[1654]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:49:37.477162 systemd[1]: Finished lvm2-activation.service. Oct 2 18:49:37.479349 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:49:37.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.481415 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 18:49:37.481493 systemd[1]: Reached target local-fs.target. Oct 2 18:49:37.483363 systemd[1]: Reached target machines.target. Oct 2 18:49:37.487929 systemd[1]: Starting ldconfig.service... Oct 2 18:49:37.493062 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 18:49:37.493185 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:37.496273 systemd[1]: Starting systemd-boot-update.service... Oct 2 18:49:37.502047 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 18:49:37.508302 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 18:49:37.511279 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:49:37.511426 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:49:37.517908 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 18:49:37.544199 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1656 (bootctl) Oct 2 18:49:37.549247 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 18:49:37.581234 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 18:49:37.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.589271 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 18:49:37.594157 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 18:49:37.600450 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 18:49:37.719725 systemd-fsck[1664]: fsck.fat 4.2 (2021-01-31) Oct 2 18:49:37.719725 systemd-fsck[1664]: /dev/nvme0n1p1: 236 files, 113463/258078 clusters Oct 2 18:49:37.725645 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 18:49:37.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.730716 systemd[1]: Mounting boot.mount... Oct 2 18:49:37.777102 systemd[1]: Mounted boot.mount. Oct 2 18:49:37.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.810478 systemd[1]: Finished systemd-boot-update.service. Oct 2 18:49:37.982969 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 18:49:37.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.987656 systemd[1]: Starting audit-rules.service... Oct 2 18:49:37.993490 systemd[1]: Starting clean-ca-certificates.service... Oct 2 18:49:37.997764 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 18:49:37.999000 audit: BPF prog-id=24 op=LOAD Oct 2 18:49:38.004682 systemd[1]: Starting systemd-resolved.service... Oct 2 18:49:38.006000 audit: BPF prog-id=25 op=LOAD Oct 2 18:49:38.012596 systemd[1]: Starting systemd-timesyncd.service... Oct 2 18:49:38.016492 systemd[1]: Starting systemd-update-utmp.service... Oct 2 18:49:38.051166 systemd[1]: Finished clean-ca-certificates.service. Oct 2 18:49:38.053314 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 18:49:38.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.065000 audit[1684]: SYSTEM_BOOT pid=1684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.074618 systemd[1]: Finished systemd-update-utmp.service. Oct 2 18:49:38.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.238539 systemd-resolved[1681]: Positive Trust Anchors: Oct 2 18:49:38.238560 systemd-resolved[1681]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:49:38.238613 systemd-resolved[1681]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:49:38.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.238669 systemd[1]: Started systemd-timesyncd.service. Oct 2 18:49:38.240837 systemd[1]: Reached target time-set.target. Oct 2 18:49:38.392058 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 18:49:38.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.396393 systemd-timesyncd[1683]: Contacted time server 108.175.15.67:123 (0.flatcar.pool.ntp.org). Oct 2 18:49:38.396515 systemd-timesyncd[1683]: Initial clock synchronization to Mon 2023-10-02 18:49:38.528005 UTC. Oct 2 18:49:38.492000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 18:49:38.492000 audit[1702]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd5302d30 a2=420 a3=0 items=0 ppid=1678 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:38.492000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 18:49:38.494997 augenrules[1702]: No rules Oct 2 18:49:38.496048 systemd[1]: Finished audit-rules.service. Oct 2 18:49:38.529012 systemd-resolved[1681]: Defaulting to hostname 'linux'. Oct 2 18:49:38.533281 systemd[1]: Started systemd-resolved.service. Oct 2 18:49:38.535446 systemd[1]: Reached target network.target. Oct 2 18:49:38.537534 systemd[1]: Reached target nss-lookup.target. Oct 2 18:49:38.679052 systemd-networkd[1540]: eth0: Gained IPv6LL Oct 2 18:49:38.685409 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 18:49:38.688269 systemd[1]: Reached target network-online.target. Oct 2 18:49:38.769268 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 18:49:38.770398 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 18:49:38.975189 ldconfig[1655]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 18:49:38.981027 systemd[1]: Finished ldconfig.service. Oct 2 18:49:38.985124 systemd[1]: Starting systemd-update-done.service... Oct 2 18:49:39.007480 systemd[1]: Finished systemd-update-done.service. Oct 2 18:49:39.009797 systemd[1]: Reached target sysinit.target. Oct 2 18:49:39.011747 systemd[1]: Started motdgen.path. Oct 2 18:49:39.013368 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 18:49:39.016087 systemd[1]: Started logrotate.timer. Oct 2 18:49:39.017888 systemd[1]: Started mdadm.timer. Oct 2 18:49:39.019356 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 18:49:39.021195 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 18:49:39.021252 systemd[1]: Reached target paths.target. Oct 2 18:49:39.022894 systemd[1]: Reached target timers.target. Oct 2 18:49:39.025265 systemd[1]: Listening on dbus.socket. Oct 2 18:49:39.028788 systemd[1]: Starting docker.socket... Oct 2 18:49:39.037500 systemd[1]: Listening on sshd.socket. Oct 2 18:49:39.039441 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:39.040308 systemd[1]: Listening on docker.socket. Oct 2 18:49:39.042163 systemd[1]: Reached target sockets.target. Oct 2 18:49:39.043899 systemd[1]: Reached target basic.target. Oct 2 18:49:39.045581 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:49:39.045643 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:49:39.047804 systemd[1]: Started amazon-ssm-agent.service. Oct 2 18:49:39.052472 systemd[1]: Starting containerd.service... Oct 2 18:49:39.060495 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 18:49:39.074172 systemd[1]: Starting dbus.service... Oct 2 18:49:39.079465 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 18:49:39.086321 systemd[1]: Starting extend-filesystems.service... Oct 2 18:49:39.088119 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 18:49:39.091408 systemd[1]: Starting motdgen.service... Oct 2 18:49:39.095338 systemd[1]: Started nvidia.service. Oct 2 18:49:39.100653 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 18:49:39.104838 systemd[1]: Starting prepare-critools.service... Oct 2 18:49:39.111806 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 18:49:39.116088 systemd[1]: Starting sshd-keygen.service... Oct 2 18:49:39.125163 systemd[1]: Starting systemd-logind.service... Oct 2 18:49:39.126943 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:39.127064 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 18:49:39.127990 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 18:49:39.129564 systemd[1]: Starting update-engine.service... Oct 2 18:49:39.134080 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 18:49:39.199017 jq[1715]: false Oct 2 18:49:39.217637 jq[1725]: true Oct 2 18:49:39.228824 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 18:49:39.229279 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 18:49:39.275793 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 18:49:39.276172 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 18:49:39.328350 tar[1727]: ./ Oct 2 18:49:39.328350 tar[1727]: ./loopback Oct 2 18:49:39.361093 jq[1732]: true Oct 2 18:49:39.368916 tar[1729]: crictl Oct 2 18:49:39.384982 dbus-daemon[1714]: [system] SELinux support is enabled Oct 2 18:49:39.388710 systemd[1]: Started dbus.service. Oct 2 18:49:39.394227 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 18:49:39.394315 systemd[1]: Reached target system-config.target. Oct 2 18:49:39.396326 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 18:49:39.396371 systemd[1]: Reached target user-config.target. Oct 2 18:49:39.410372 dbus-daemon[1714]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1540 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 18:49:39.411345 extend-filesystems[1716]: Found nvme0n1 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p1 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p2 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p3 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found usr Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p4 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p6 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p7 Oct 2 18:49:39.413361 extend-filesystems[1716]: Found nvme0n1p9 Oct 2 18:49:39.413361 extend-filesystems[1716]: Checking size of /dev/nvme0n1p9 Oct 2 18:49:39.453712 systemd[1]: Starting systemd-hostnamed.service... Oct 2 18:49:39.597848 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 18:49:39.598264 systemd[1]: Finished motdgen.service. Oct 2 18:49:39.602122 update_engine[1724]: I1002 18:49:39.601387 1724 main.cc:92] Flatcar Update Engine starting Oct 2 18:49:39.617395 extend-filesystems[1716]: Resized partition /dev/nvme0n1p9 Oct 2 18:49:39.621764 systemd[1]: Started update-engine.service. Oct 2 18:49:39.626688 systemd[1]: Started locksmithd.service. Oct 2 18:49:39.629542 update_engine[1724]: I1002 18:49:39.629478 1724 update_check_scheduler.cc:74] Next update check in 4m26s Oct 2 18:49:39.643680 extend-filesystems[1774]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 18:49:39.666514 amazon-ssm-agent[1711]: 2023/10/02 18:49:39 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 18:49:39.680572 amazon-ssm-agent[1711]: Initializing new seelog logger Oct 2 18:49:39.690895 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 18:49:39.694191 amazon-ssm-agent[1711]: New Seelog Logger Creation Complete Oct 2 18:49:39.694445 amazon-ssm-agent[1711]: 2023/10/02 18:49:39 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:49:39.694445 amazon-ssm-agent[1711]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:49:39.694997 amazon-ssm-agent[1711]: 2023/10/02 18:49:39 processing appconfig overrides Oct 2 18:49:39.751905 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 18:49:39.774452 tar[1727]: ./bandwidth Oct 2 18:49:39.777970 extend-filesystems[1774]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 18:49:39.777970 extend-filesystems[1774]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 18:49:39.777970 extend-filesystems[1774]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 18:49:39.785770 extend-filesystems[1716]: Resized filesystem in /dev/nvme0n1p9 Oct 2 18:49:39.786680 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 18:49:39.787049 systemd[1]: Finished extend-filesystems.service. Oct 2 18:49:39.839773 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 18:49:39.851062 bash[1796]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:49:39.852829 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 18:49:39.859309 systemd-logind[1723]: Watching system buttons on /dev/input/event0 (Power Button) Oct 2 18:49:39.866271 env[1731]: time="2023-10-02T18:49:39.866189950Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 18:49:39.870167 systemd-logind[1723]: New seat seat0. Oct 2 18:49:39.880902 systemd[1]: Started systemd-logind.service. Oct 2 18:49:39.936704 tar[1727]: ./ptp Oct 2 18:49:40.064272 dbus-daemon[1714]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 18:49:40.064543 systemd[1]: Started systemd-hostnamed.service. Oct 2 18:49:40.067606 dbus-daemon[1714]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1753 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 18:49:40.072299 systemd[1]: Starting polkit.service... Oct 2 18:49:40.133838 polkitd[1802]: Started polkitd version 121 Oct 2 18:49:40.144713 tar[1727]: ./vlan Oct 2 18:49:40.162842 polkitd[1802]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 18:49:40.162984 polkitd[1802]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 18:49:40.165062 env[1731]: time="2023-10-02T18:49:40.164964388Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 18:49:40.170652 polkitd[1802]: Finished loading, compiling and executing 2 rules Oct 2 18:49:40.171458 dbus-daemon[1714]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 18:49:40.171738 systemd[1]: Started polkit.service. Oct 2 18:49:40.173376 env[1731]: time="2023-10-02T18:49:40.173330079Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.175967 polkitd[1802]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 18:49:40.195206 env[1731]: time="2023-10-02T18:49:40.195137621Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:40.195422 env[1731]: time="2023-10-02T18:49:40.195389820Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.195984 env[1731]: time="2023-10-02T18:49:40.195936459Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:40.196137 env[1731]: time="2023-10-02T18:49:40.196106064Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.196291 env[1731]: time="2023-10-02T18:49:40.196230338Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 18:49:40.196409 env[1731]: time="2023-10-02T18:49:40.196379359Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.196753 env[1731]: time="2023-10-02T18:49:40.196722819Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.197538 env[1731]: time="2023-10-02T18:49:40.197498687Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:40.198073 env[1731]: time="2023-10-02T18:49:40.198025946Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:40.198298 env[1731]: time="2023-10-02T18:49:40.198227761Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 18:49:40.198539 env[1731]: time="2023-10-02T18:49:40.198505548Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 18:49:40.198689 env[1731]: time="2023-10-02T18:49:40.198659560Z" level=info msg="metadata content store policy set" policy=shared Oct 2 18:49:40.210763 env[1731]: time="2023-10-02T18:49:40.210635433Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 18:49:40.211023 env[1731]: time="2023-10-02T18:49:40.210985345Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 18:49:40.211160 env[1731]: time="2023-10-02T18:49:40.211129047Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 18:49:40.211590 systemd-hostnamed[1753]: Hostname set to (transient) Oct 2 18:49:40.211764 systemd-resolved[1681]: System hostname changed to 'ip-172-31-28-180'. Oct 2 18:49:40.213067 env[1731]: time="2023-10-02T18:49:40.213023353Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.214972 env[1731]: time="2023-10-02T18:49:40.214921384Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.215179 env[1731]: time="2023-10-02T18:49:40.215146912Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.215322 env[1731]: time="2023-10-02T18:49:40.215290687Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.219438 env[1731]: time="2023-10-02T18:49:40.219384609Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.219641 env[1731]: time="2023-10-02T18:49:40.219610746Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.219769 env[1731]: time="2023-10-02T18:49:40.219737783Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.219920 env[1731]: time="2023-10-02T18:49:40.219889471Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.220040 env[1731]: time="2023-10-02T18:49:40.220011370Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 18:49:40.220394 env[1731]: time="2023-10-02T18:49:40.220361465Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 18:49:40.220671 env[1731]: time="2023-10-02T18:49:40.220638777Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 18:49:40.221583 env[1731]: time="2023-10-02T18:49:40.221544627Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 18:49:40.227556 env[1731]: time="2023-10-02T18:49:40.227499295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.227768 env[1731]: time="2023-10-02T18:49:40.227733551Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 18:49:40.228088 env[1731]: time="2023-10-02T18:49:40.228053821Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.229731 env[1731]: time="2023-10-02T18:49:40.229685107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.232972 env[1731]: time="2023-10-02T18:49:40.232919606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.233159 env[1731]: time="2023-10-02T18:49:40.233128872Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.233282 env[1731]: time="2023-10-02T18:49:40.233252025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.237015 env[1731]: time="2023-10-02T18:49:40.236961623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.237217 env[1731]: time="2023-10-02T18:49:40.237180493Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.237347 env[1731]: time="2023-10-02T18:49:40.237316903Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.237514 env[1731]: time="2023-10-02T18:49:40.237484196Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 18:49:40.237924 env[1731]: time="2023-10-02T18:49:40.237889933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.239965 env[1731]: time="2023-10-02T18:49:40.239916486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.240154 env[1731]: time="2023-10-02T18:49:40.240110620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.240314 env[1731]: time="2023-10-02T18:49:40.240283951Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 18:49:40.240446 env[1731]: time="2023-10-02T18:49:40.240412984Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 18:49:40.240570 env[1731]: time="2023-10-02T18:49:40.240541129Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 18:49:40.240698 env[1731]: time="2023-10-02T18:49:40.240666997Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 18:49:40.240870 env[1731]: time="2023-10-02T18:49:40.240825282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 18:49:40.241414 env[1731]: time="2023-10-02T18:49:40.241314988Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 18:49:40.245689 env[1731]: time="2023-10-02T18:49:40.245629776Z" level=info msg="Connect containerd service" Oct 2 18:49:40.245989 env[1731]: time="2023-10-02T18:49:40.245945080Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 18:49:40.247294 env[1731]: time="2023-10-02T18:49:40.247239662Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:49:40.254527 env[1731]: time="2023-10-02T18:49:40.254477127Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 18:49:40.254786 env[1731]: time="2023-10-02T18:49:40.254756947Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 18:49:40.255199 env[1731]: time="2023-10-02T18:49:40.255055257Z" level=info msg="Start subscribing containerd event" Oct 2 18:49:40.274937 env[1731]: time="2023-10-02T18:49:40.274850573Z" level=info msg="Start recovering state" Oct 2 18:49:40.275254 env[1731]: time="2023-10-02T18:49:40.275222359Z" level=info msg="Start event monitor" Oct 2 18:49:40.275477 env[1731]: time="2023-10-02T18:49:40.275441582Z" level=info msg="Start snapshots syncer" Oct 2 18:49:40.275636 env[1731]: time="2023-10-02T18:49:40.275606258Z" level=info msg="Start cni network conf syncer for default" Oct 2 18:49:40.276302 env[1731]: time="2023-10-02T18:49:40.276261150Z" level=info msg="Start streaming server" Oct 2 18:49:40.276702 env[1731]: time="2023-10-02T18:49:40.276646619Z" level=info msg="containerd successfully booted in 0.431260s" Oct 2 18:49:40.276783 systemd[1]: Started containerd.service. Oct 2 18:49:40.368002 tar[1727]: ./host-device Oct 2 18:49:40.397734 amazon-ssm-agent[1711]: 2023-10-02 18:49:40 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-0bcdbe5ab07217a0c is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-0bcdbe5ab07217a0c because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 18:49:40.397734 amazon-ssm-agent[1711]: status code: 400, request id: ac0f8caa-c169-474f-8b72-2659353e3e03 Oct 2 18:49:40.398209 amazon-ssm-agent[1711]: 2023-10-02 18:49:40 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 18:49:40.445044 coreos-metadata[1713]: Oct 02 18:49:40.444 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 18:49:40.450669 coreos-metadata[1713]: Oct 02 18:49:40.450 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 18:49:40.452451 coreos-metadata[1713]: Oct 02 18:49:40.452 INFO Fetch successful Oct 2 18:49:40.452771 coreos-metadata[1713]: Oct 02 18:49:40.452 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 18:49:40.454186 coreos-metadata[1713]: Oct 02 18:49:40.453 INFO Fetch successful Oct 2 18:49:40.459930 unknown[1713]: wrote ssh authorized keys file for user: core Oct 2 18:49:40.496536 tar[1727]: ./tuning Oct 2 18:49:40.503659 update-ssh-keys[1841]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:49:40.504795 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 18:49:40.607299 tar[1727]: ./vrf Oct 2 18:49:40.715819 tar[1727]: ./sbr Oct 2 18:49:40.819782 tar[1727]: ./tap Oct 2 18:49:40.943508 tar[1727]: ./dhcp Oct 2 18:49:41.211700 tar[1727]: ./static Oct 2 18:49:41.258918 tar[1727]: ./firewall Oct 2 18:49:41.331603 tar[1727]: ./macvlan Oct 2 18:49:41.404892 tar[1727]: ./dummy Oct 2 18:49:41.509152 tar[1727]: ./bridge Oct 2 18:49:41.629788 tar[1727]: ./ipvlan Oct 2 18:49:41.668177 systemd[1]: Finished prepare-critools.service. Oct 2 18:49:41.706754 tar[1727]: ./portmap Oct 2 18:49:41.768425 tar[1727]: ./host-local Oct 2 18:49:41.851717 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 18:49:41.974638 locksmithd[1773]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 18:49:44.807240 sshd_keygen[1748]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 18:49:44.867755 systemd[1]: Finished sshd-keygen.service. Oct 2 18:49:44.872895 systemd[1]: Starting issuegen.service... Oct 2 18:49:44.892332 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 18:49:44.892687 systemd[1]: Finished issuegen.service. Oct 2 18:49:44.897522 systemd[1]: Starting systemd-user-sessions.service... Oct 2 18:49:44.924338 systemd[1]: Finished systemd-user-sessions.service. Oct 2 18:49:44.929144 systemd[1]: Started getty@tty1.service. Oct 2 18:49:44.934799 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 18:49:44.937235 systemd[1]: Reached target getty.target. Oct 2 18:49:44.939151 systemd[1]: Reached target multi-user.target. Oct 2 18:49:44.947607 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 18:49:44.978681 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 18:49:44.979083 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 18:49:44.981553 systemd[1]: Startup finished in 1.212s (kernel) + 14.208s (initrd) + 15.169s (userspace) = 30.590s. Oct 2 18:49:47.835087 systemd[1]: Created slice system-sshd.slice. Oct 2 18:49:47.837366 systemd[1]: Started sshd@0-172.31.28.180:22-139.178.89.65:55486.service. Oct 2 18:49:48.028139 sshd[1921]: Accepted publickey for core from 139.178.89.65 port 55486 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:48.033358 sshd[1921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:48.051948 systemd[1]: Created slice user-500.slice. Oct 2 18:49:48.054589 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 18:49:48.062176 systemd-logind[1723]: New session 1 of user core. Oct 2 18:49:48.082828 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 18:49:48.085906 systemd[1]: Starting user@500.service... Oct 2 18:49:48.097198 (systemd)[1924]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:48.297763 systemd[1924]: Queued start job for default target default.target. Oct 2 18:49:48.298802 systemd[1924]: Reached target paths.target. Oct 2 18:49:48.298887 systemd[1924]: Reached target sockets.target. Oct 2 18:49:48.298926 systemd[1924]: Reached target timers.target. Oct 2 18:49:48.298958 systemd[1924]: Reached target basic.target. Oct 2 18:49:48.299050 systemd[1924]: Reached target default.target. Oct 2 18:49:48.299113 systemd[1924]: Startup finished in 184ms. Oct 2 18:49:48.300096 systemd[1]: Started user@500.service. Oct 2 18:49:48.302073 systemd[1]: Started session-1.scope. Oct 2 18:49:48.456959 systemd[1]: Started sshd@1-172.31.28.180:22-139.178.89.65:55494.service. Oct 2 18:49:48.642507 sshd[1933]: Accepted publickey for core from 139.178.89.65 port 55494 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:48.645844 sshd[1933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:48.654942 systemd-logind[1723]: New session 2 of user core. Oct 2 18:49:48.655953 systemd[1]: Started session-2.scope. Oct 2 18:49:48.803441 sshd[1933]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:48.809456 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 18:49:48.810568 systemd[1]: sshd@1-172.31.28.180:22-139.178.89.65:55494.service: Deactivated successfully. Oct 2 18:49:48.812199 systemd-logind[1723]: Session 2 logged out. Waiting for processes to exit. Oct 2 18:49:48.813699 systemd-logind[1723]: Removed session 2. Oct 2 18:49:48.835408 systemd[1]: Started sshd@2-172.31.28.180:22-139.178.89.65:55504.service. Oct 2 18:49:49.012554 sshd[1939]: Accepted publickey for core from 139.178.89.65 port 55504 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:49.015839 sshd[1939]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:49.024958 systemd-logind[1723]: New session 3 of user core. Oct 2 18:49:49.025292 systemd[1]: Started session-3.scope. Oct 2 18:49:49.157382 sshd[1939]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:49.163295 systemd-logind[1723]: Session 3 logged out. Waiting for processes to exit. Oct 2 18:49:49.163831 systemd[1]: sshd@2-172.31.28.180:22-139.178.89.65:55504.service: Deactivated successfully. Oct 2 18:49:49.165112 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 18:49:49.166636 systemd-logind[1723]: Removed session 3. Oct 2 18:49:49.192004 systemd[1]: Started sshd@3-172.31.28.180:22-139.178.89.65:55512.service. Oct 2 18:49:49.378269 sshd[1945]: Accepted publickey for core from 139.178.89.65 port 55512 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:49.381479 sshd[1945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:49.390602 systemd[1]: Started session-4.scope. Oct 2 18:49:49.391966 systemd-logind[1723]: New session 4 of user core. Oct 2 18:49:49.540488 sshd[1945]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:49.547278 systemd[1]: sshd@3-172.31.28.180:22-139.178.89.65:55512.service: Deactivated successfully. Oct 2 18:49:49.548528 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 18:49:49.549701 systemd-logind[1723]: Session 4 logged out. Waiting for processes to exit. Oct 2 18:49:49.551444 systemd-logind[1723]: Removed session 4. Oct 2 18:49:49.570467 systemd[1]: Started sshd@4-172.31.28.180:22-139.178.89.65:55518.service. Oct 2 18:49:49.753090 sshd[1951]: Accepted publickey for core from 139.178.89.65 port 55518 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:49.756778 sshd[1951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:49.765032 systemd-logind[1723]: New session 5 of user core. Oct 2 18:49:49.765482 systemd[1]: Started session-5.scope. Oct 2 18:49:49.894994 sudo[1954]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 18:49:49.896135 sudo[1954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:49.913144 dbus-daemon[1714]: avc: received setenforce notice (enforcing=1) Oct 2 18:49:49.916919 sudo[1954]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:49.941888 sshd[1951]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:49.947737 systemd-logind[1723]: Session 5 logged out. Waiting for processes to exit. Oct 2 18:49:49.948420 systemd[1]: sshd@4-172.31.28.180:22-139.178.89.65:55518.service: Deactivated successfully. Oct 2 18:49:49.949694 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 18:49:49.951479 systemd-logind[1723]: Removed session 5. Oct 2 18:49:49.970602 systemd[1]: Started sshd@5-172.31.28.180:22-139.178.89.65:55530.service. Oct 2 18:49:50.148681 sshd[1958]: Accepted publickey for core from 139.178.89.65 port 55530 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:50.152502 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:50.161835 systemd[1]: Started session-6.scope. Oct 2 18:49:50.162817 systemd-logind[1723]: New session 6 of user core. Oct 2 18:49:50.284715 sudo[1962]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 18:49:50.286682 sudo[1962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:50.295731 sudo[1962]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:50.311386 sudo[1961]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 18:49:50.312367 sudo[1961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:50.340136 systemd[1]: Stopping audit-rules.service... Oct 2 18:49:50.346000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:49:50.349734 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 2 18:49:50.349823 kernel: audit: type=1305 audit(1696272590.346:156): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:49:50.350100 auditctl[1965]: No rules Oct 2 18:49:50.355722 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 18:49:50.356180 systemd[1]: Stopped audit-rules.service. Oct 2 18:49:50.346000 audit[1965]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6ed07f0 a2=420 a3=0 items=0 ppid=1 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:50.368235 kernel: audit: type=1300 audit(1696272590.346:156): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6ed07f0 a2=420 a3=0 items=0 ppid=1 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:50.368231 systemd[1]: Starting audit-rules.service... Oct 2 18:49:50.346000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:49:50.372917 kernel: audit: type=1327 audit(1696272590.346:156): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:49:50.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.384924 kernel: audit: type=1131 audit(1696272590.355:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.428727 augenrules[1982]: No rules Oct 2 18:49:50.431014 systemd[1]: Finished audit-rules.service. Oct 2 18:49:50.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.439678 sudo[1961]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:50.437000 audit[1961]: USER_END pid=1961 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.450663 kernel: audit: type=1130 audit(1696272590.430:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.450749 kernel: audit: type=1106 audit(1696272590.437:159): pid=1961 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.438000 audit[1961]: CRED_DISP pid=1961 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.459400 kernel: audit: type=1104 audit(1696272590.438:160): pid=1961 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.464230 sshd[1958]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:50.464000 audit[1958]: USER_END pid=1958 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.478812 systemd[1]: sshd@5-172.31.28.180:22-139.178.89.65:55530.service: Deactivated successfully. Oct 2 18:49:50.464000 audit[1958]: CRED_DISP pid=1958 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.480089 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 18:49:50.488614 kernel: audit: type=1106 audit(1696272590.464:161): pid=1958 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.488826 kernel: audit: type=1104 audit(1696272590.464:162): pid=1958 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.180:22-139.178.89.65:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.498919 kernel: audit: type=1131 audit(1696272590.478:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.180:22-139.178.89.65:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.499120 systemd-logind[1723]: Session 6 logged out. Waiting for processes to exit. Oct 2 18:49:50.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.180:22-139.178.89.65:55546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.509543 systemd[1]: Started sshd@6-172.31.28.180:22-139.178.89.65:55546.service. Oct 2 18:49:50.512203 systemd-logind[1723]: Removed session 6. Oct 2 18:49:50.697000 audit[1989]: USER_ACCT pid=1989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.699070 sshd[1989]: Accepted publickey for core from 139.178.89.65 port 55546 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:50.699000 audit[1989]: CRED_ACQ pid=1989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.700000 audit[1989]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0833970 a2=3 a3=1 items=0 ppid=1 pid=1989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:50.700000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:49:50.703016 sshd[1989]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:50.712140 systemd[1]: Started session-7.scope. Oct 2 18:49:50.712901 systemd-logind[1723]: New session 7 of user core. Oct 2 18:49:50.720000 audit[1989]: USER_START pid=1989 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.727000 audit[1991]: CRED_ACQ pid=1991 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.835000 audit[1992]: USER_ACCT pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.836651 sudo[1992]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 18:49:50.836000 audit[1992]: CRED_REFR pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.837773 sudo[1992]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:50.840000 audit[1992]: USER_START pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:51.576792 systemd[1]: Starting docker.service... Oct 2 18:49:51.686990 env[2007]: time="2023-10-02T18:49:51.686890242Z" level=info msg="Starting up" Oct 2 18:49:51.690732 env[2007]: time="2023-10-02T18:49:51.690683554Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:49:51.690974 env[2007]: time="2023-10-02T18:49:51.690940833Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:49:51.691113 env[2007]: time="2023-10-02T18:49:51.691078941Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:49:51.691250 env[2007]: time="2023-10-02T18:49:51.691223070Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:49:51.696107 env[2007]: time="2023-10-02T18:49:51.696056585Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:49:51.696292 env[2007]: time="2023-10-02T18:49:51.696263838Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:49:51.696416 env[2007]: time="2023-10-02T18:49:51.696385802Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:49:51.696523 env[2007]: time="2023-10-02T18:49:51.696495978Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:49:51.707928 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1651722555-merged.mount: Deactivated successfully. Oct 2 18:49:51.749711 env[2007]: time="2023-10-02T18:49:51.749649414Z" level=info msg="Loading containers: start." Oct 2 18:49:51.861000 audit[2037]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.861000 audit[2037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffce267110 a2=0 a3=1 items=0 ppid=2007 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 18:49:51.868000 audit[2039]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.868000 audit[2039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd8c7d8a0 a2=0 a3=1 items=0 ppid=2007 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 18:49:51.875000 audit[2041]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.875000 audit[2041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe6842aa0 a2=0 a3=1 items=0 ppid=2007 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:49:51.881000 audit[2043]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.881000 audit[2043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffb951600 a2=0 a3=1 items=0 ppid=2007 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:49:51.890000 audit[2045]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.890000 audit[2045]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd84999d0 a2=0 a3=1 items=0 ppid=2007 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.890000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 18:49:51.924000 audit[2050]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.924000 audit[2050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde7c2f80 a2=0 a3=1 items=0 ppid=2007 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 18:49:51.941000 audit[2052]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.941000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff608f4d0 a2=0 a3=1 items=0 ppid=2007 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 18:49:51.947000 audit[2054]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.947000 audit[2054]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc6cb0180 a2=0 a3=1 items=0 ppid=2007 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 18:49:51.955000 audit[2056]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.955000 audit[2056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffeac6df10 a2=0 a3=1 items=0 ppid=2007 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:51.976000 audit[2060]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.976000 audit[2060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff98181d0 a2=0 a3=1 items=0 ppid=2007 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:51.980000 audit[2061]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:51.980000 audit[2061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd7571ab0 a2=0 a3=1 items=0 ppid=2007 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:51.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:51.993881 kernel: Initializing XFRM netlink socket Oct 2 18:49:52.040161 env[2007]: time="2023-10-02T18:49:52.040114792Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 18:49:52.043109 (udev-worker)[2017]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:52.078000 audit[2070]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.078000 audit[2070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe116ce80 a2=0 a3=1 items=0 ppid=2007 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 18:49:52.102000 audit[2073]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.102000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff5ce3e50 a2=0 a3=1 items=0 ppid=2007 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 18:49:52.112000 audit[2076]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.112000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff9af5960 a2=0 a3=1 items=0 ppid=2007 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 18:49:52.123000 audit[2078]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.123000 audit[2078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffffa8e350 a2=0 a3=1 items=0 ppid=2007 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 18:49:52.131000 audit[2080]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.131000 audit[2080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd64ac5e0 a2=0 a3=1 items=0 ppid=2007 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 18:49:52.139000 audit[2082]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.139000 audit[2082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc5132cc0 a2=0 a3=1 items=0 ppid=2007 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 18:49:52.145000 audit[2084]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.145000 audit[2084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdc00d4b0 a2=0 a3=1 items=0 ppid=2007 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 18:49:52.165000 audit[2087]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.165000 audit[2087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff9acfb40 a2=0 a3=1 items=0 ppid=2007 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 18:49:52.174000 audit[2089]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.174000 audit[2089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff84c2900 a2=0 a3=1 items=0 ppid=2007 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:49:52.182000 audit[2092]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.182000 audit[2092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc5baf490 a2=0 a3=1 items=0 ppid=2007 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:49:52.188000 audit[2094]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.188000 audit[2094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd83e9c70 a2=0 a3=1 items=0 ppid=2007 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 18:49:52.191103 systemd-networkd[1540]: docker0: Link UP Oct 2 18:49:52.210000 audit[2098]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.210000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdbc0e250 a2=0 a3=1 items=0 ppid=2007 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.210000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:52.213000 audit[2099]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:52.213000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc0535d00 a2=0 a3=1 items=0 ppid=2007 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:52.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:52.216538 env[2007]: time="2023-10-02T18:49:52.216495312Z" level=info msg="Loading containers: done." Oct 2 18:49:52.245405 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2119052107-merged.mount: Deactivated successfully. Oct 2 18:49:52.262042 env[2007]: time="2023-10-02T18:49:52.261985065Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 18:49:52.262642 env[2007]: time="2023-10-02T18:49:52.262610287Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 18:49:52.262965 env[2007]: time="2023-10-02T18:49:52.262937996Z" level=info msg="Daemon has completed initialization" Oct 2 18:49:52.295754 systemd[1]: Started docker.service. Oct 2 18:49:52.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:52.309098 env[2007]: time="2023-10-02T18:49:52.308910491Z" level=info msg="API listen on /run/docker.sock" Oct 2 18:49:52.361655 systemd[1]: Reloading. Oct 2 18:49:52.516026 /usr/lib/systemd/system-generators/torcx-generator[2145]: time="2023-10-02T18:49:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:49:52.516090 /usr/lib/systemd/system-generators/torcx-generator[2145]: time="2023-10-02T18:49:52Z" level=info msg="torcx already run" Oct 2 18:49:52.781336 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:49:52.781941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:49:52.825334 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.984000 audit: BPF prog-id=34 op=LOAD Oct 2 18:49:52.984000 audit: BPF prog-id=15 op=UNLOAD Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit: BPF prog-id=35 op=LOAD Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.987000 audit: BPF prog-id=36 op=LOAD Oct 2 18:49:52.987000 audit: BPF prog-id=16 op=UNLOAD Oct 2 18:49:52.987000 audit: BPF prog-id=17 op=UNLOAD Oct 2 18:49:52.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.994000 audit: BPF prog-id=37 op=LOAD Oct 2 18:49:52.994000 audit: BPF prog-id=26 op=UNLOAD Oct 2 18:49:52.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.995000 audit: BPF prog-id=38 op=LOAD Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.997000 audit: BPF prog-id=39 op=LOAD Oct 2 18:49:52.997000 audit: BPF prog-id=27 op=UNLOAD Oct 2 18:49:52.997000 audit: BPF prog-id=28 op=UNLOAD Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:52.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit: BPF prog-id=40 op=LOAD Oct 2 18:49:53.000000 audit: BPF prog-id=29 op=UNLOAD Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit: BPF prog-id=41 op=LOAD Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.000000 audit: BPF prog-id=42 op=LOAD Oct 2 18:49:53.000000 audit: BPF prog-id=30 op=UNLOAD Oct 2 18:49:53.000000 audit: BPF prog-id=31 op=UNLOAD Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.001000 audit: BPF prog-id=43 op=LOAD Oct 2 18:49:53.001000 audit: BPF prog-id=24 op=UNLOAD Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.003000 audit: BPF prog-id=44 op=LOAD Oct 2 18:49:53.003000 audit: BPF prog-id=25 op=UNLOAD Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit: BPF prog-id=45 op=LOAD Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.004000 audit: BPF prog-id=46 op=LOAD Oct 2 18:49:53.004000 audit: BPF prog-id=18 op=UNLOAD Oct 2 18:49:53.004000 audit: BPF prog-id=19 op=UNLOAD Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit: BPF prog-id=47 op=LOAD Oct 2 18:49:53.006000 audit: BPF prog-id=21 op=UNLOAD Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit: BPF prog-id=48 op=LOAD Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.006000 audit: BPF prog-id=49 op=LOAD Oct 2 18:49:53.006000 audit: BPF prog-id=22 op=UNLOAD Oct 2 18:49:53.006000 audit: BPF prog-id=23 op=UNLOAD Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.012000 audit: BPF prog-id=50 op=LOAD Oct 2 18:49:53.012000 audit: BPF prog-id=32 op=UNLOAD Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:53.015000 audit: BPF prog-id=51 op=LOAD Oct 2 18:49:53.015000 audit: BPF prog-id=20 op=UNLOAD Oct 2 18:49:53.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:53.059840 systemd[1]: Started kubelet.service. Oct 2 18:49:53.223914 kubelet[2200]: E1002 18:49:53.223801 2200 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:49:53.228480 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:49:53.228799 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:49:53.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:49:53.657549 env[1731]: time="2023-10-02T18:49:53.657485831Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 18:49:54.275375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2569248512.mount: Deactivated successfully. Oct 2 18:49:56.891550 env[1731]: time="2023-10-02T18:49:56.891481695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:56.895639 env[1731]: time="2023-10-02T18:49:56.894604709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84fc12f356926a06f93f99d06ff6b5c8df1d39c609ddaae4aaf09048dc816c36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:56.899913 env[1731]: time="2023-10-02T18:49:56.898245477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:56.901950 env[1731]: time="2023-10-02T18:49:56.901890670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:56.903784 env[1731]: time="2023-10-02T18:49:56.903718122Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:84fc12f356926a06f93f99d06ff6b5c8df1d39c609ddaae4aaf09048dc816c36\"" Oct 2 18:49:56.933592 env[1731]: time="2023-10-02T18:49:56.933542876Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 18:49:59.406689 env[1731]: time="2023-10-02T18:49:59.406617911Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:59.410444 env[1731]: time="2023-10-02T18:49:59.410363212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b19e3051492d4e2377e15803f07d9bd2a4578c7e26e5fa088582d59e08884b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:59.417174 env[1731]: time="2023-10-02T18:49:59.417116534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:59.421684 env[1731]: time="2023-10-02T18:49:59.421605770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:59.425682 env[1731]: time="2023-10-02T18:49:59.425596245Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:66b19e3051492d4e2377e15803f07d9bd2a4578c7e26e5fa088582d59e08884b\"" Oct 2 18:49:59.456667 env[1731]: time="2023-10-02T18:49:59.456564329Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 18:50:00.961153 env[1731]: time="2023-10-02T18:50:00.961091343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.964141 env[1731]: time="2023-10-02T18:50:00.964053663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1faa1d898c625343f7c70abbc8e9d160eb6dc3002ec2481cf8f4abd61dc34eed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.967761 env[1731]: time="2023-10-02T18:50:00.967691524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.971412 env[1731]: time="2023-10-02T18:50:00.971352184Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.973020 env[1731]: time="2023-10-02T18:50:00.972971457Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:1faa1d898c625343f7c70abbc8e9d160eb6dc3002ec2481cf8f4abd61dc34eed\"" Oct 2 18:50:01.002215 env[1731]: time="2023-10-02T18:50:01.002114345Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 18:50:02.305049 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1877183651.mount: Deactivated successfully. Oct 2 18:50:03.084790 env[1731]: time="2023-10-02T18:50:03.084722827Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.087613 env[1731]: time="2023-10-02T18:50:03.087561259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.090788 env[1731]: time="2023-10-02T18:50:03.090733838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.093230 env[1731]: time="2023-10-02T18:50:03.093154618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.095444 env[1731]: time="2023-10-02T18:50:03.094434721Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af\"" Oct 2 18:50:03.124860 env[1731]: time="2023-10-02T18:50:03.124779345Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 18:50:03.441589 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 18:50:03.451927 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 18:50:03.452039 kernel: audit: type=1130 audit(1696272603.441:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.441955 systemd[1]: Stopped kubelet.service. Oct 2 18:50:03.444643 systemd[1]: Started kubelet.service. Oct 2 18:50:03.460498 kernel: audit: type=1131 audit(1696272603.441:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.469890 kernel: audit: type=1130 audit(1696272603.443:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:03.605343 kubelet[2241]: E1002 18:50:03.605249 2241 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:50:03.612554 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:50:03.612922 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:50:03.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:03.621914 kernel: audit: type=1131 audit(1696272603.612:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:03.656585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3531377389.mount: Deactivated successfully. Oct 2 18:50:03.666146 env[1731]: time="2023-10-02T18:50:03.666076018Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.668874 env[1731]: time="2023-10-02T18:50:03.668773031Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.671882 env[1731]: time="2023-10-02T18:50:03.671798343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.674533 env[1731]: time="2023-10-02T18:50:03.674478413Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:03.675679 env[1731]: time="2023-10-02T18:50:03.675628181Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 18:50:03.705479 env[1731]: time="2023-10-02T18:50:03.705308509Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 18:50:04.692085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1624001810.mount: Deactivated successfully. Oct 2 18:50:09.060170 env[1731]: time="2023-10-02T18:50:09.060084265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:09.063738 env[1731]: time="2023-10-02T18:50:09.063672429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:09.067060 env[1731]: time="2023-10-02T18:50:09.067005660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:09.070050 env[1731]: time="2023-10-02T18:50:09.069987090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:09.071650 env[1731]: time="2023-10-02T18:50:09.071583052Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Oct 2 18:50:09.102416 env[1731]: time="2023-10-02T18:50:09.102366642Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 18:50:09.706836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3541378589.mount: Deactivated successfully. Oct 2 18:50:10.245230 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 18:50:10.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:10.256896 kernel: audit: type=1131 audit(1696272610.244:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:10.268000 audit: BPF prog-id=42 op=UNLOAD Oct 2 18:50:10.274458 kernel: audit: type=1334 audit(1696272610.268:411): prog-id=42 op=UNLOAD Oct 2 18:50:10.274577 kernel: audit: type=1334 audit(1696272610.268:412): prog-id=41 op=UNLOAD Oct 2 18:50:10.268000 audit: BPF prog-id=41 op=UNLOAD Oct 2 18:50:10.268000 audit: BPF prog-id=40 op=UNLOAD Oct 2 18:50:10.277875 kernel: audit: type=1334 audit(1696272610.268:413): prog-id=40 op=UNLOAD Oct 2 18:50:10.524979 env[1731]: time="2023-10-02T18:50:10.524795757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:10.528701 env[1731]: time="2023-10-02T18:50:10.528645405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:10.539384 env[1731]: time="2023-10-02T18:50:10.539319880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:10.541213 env[1731]: time="2023-10-02T18:50:10.541158254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:10.542390 env[1731]: time="2023-10-02T18:50:10.542328981Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 18:50:13.691609 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 18:50:13.691986 systemd[1]: Stopped kubelet.service. Oct 2 18:50:13.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.712479 kernel: audit: type=1130 audit(1696272613.691:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.712620 kernel: audit: type=1131 audit(1696272613.691:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.707482 systemd[1]: Started kubelet.service. Oct 2 18:50:13.725714 kernel: audit: type=1130 audit(1696272613.706:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.871443 kubelet[2322]: E1002 18:50:13.871369 2322 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:50:13.875269 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:50:13.875611 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:50:13.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:13.885892 kernel: audit: type=1131 audit(1696272613.875:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:16.782069 systemd[1]: Stopped kubelet.service. Oct 2 18:50:16.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:16.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:16.799206 kernel: audit: type=1130 audit(1696272616.780:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:16.799359 kernel: audit: type=1131 audit(1696272616.780:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:16.847313 systemd[1]: Reloading. Oct 2 18:50:17.034009 /usr/lib/systemd/system-generators/torcx-generator[2351]: time="2023-10-02T18:50:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:50:17.034076 /usr/lib/systemd/system-generators/torcx-generator[2351]: time="2023-10-02T18:50:17Z" level=info msg="torcx already run" Oct 2 18:50:17.315494 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:50:17.315536 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:50:17.362629 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538886 kernel: audit: type=1400 audit(1696272617.522:420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.539055 kernel: audit: type=1400 audit(1696272617.522:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546831 kernel: audit: type=1400 audit(1696272617.522:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554692 kernel: audit: type=1400 audit(1696272617.522:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.562604 kernel: audit: type=1400 audit(1696272617.522:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.562759 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.572342 kernel: audit: type=1400 audit(1696272617.522:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.572502 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit: BPF prog-id=52 op=LOAD Oct 2 18:50:17.530000 audit: BPF prog-id=34 op=UNLOAD Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.537000 audit: BPF prog-id=53 op=LOAD Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.538000 audit: BPF prog-id=54 op=LOAD Oct 2 18:50:17.538000 audit: BPF prog-id=35 op=UNLOAD Oct 2 18:50:17.538000 audit: BPF prog-id=36 op=UNLOAD Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.545000 audit: BPF prog-id=55 op=LOAD Oct 2 18:50:17.546000 audit: BPF prog-id=37 op=UNLOAD Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.553000 audit: BPF prog-id=56 op=LOAD Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.554000 audit: BPF prog-id=57 op=LOAD Oct 2 18:50:17.554000 audit: BPF prog-id=38 op=UNLOAD Oct 2 18:50:17.554000 audit: BPF prog-id=39 op=UNLOAD Oct 2 18:50:17.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.574000 audit: BPF prog-id=58 op=LOAD Oct 2 18:50:17.574000 audit: BPF prog-id=43 op=UNLOAD Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.576000 audit: BPF prog-id=59 op=LOAD Oct 2 18:50:17.576000 audit: BPF prog-id=44 op=UNLOAD Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit: BPF prog-id=60 op=LOAD Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.577000 audit: BPF prog-id=61 op=LOAD Oct 2 18:50:17.578000 audit: BPF prog-id=45 op=UNLOAD Oct 2 18:50:17.578000 audit: BPF prog-id=46 op=UNLOAD Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit: BPF prog-id=62 op=LOAD Oct 2 18:50:17.579000 audit: BPF prog-id=47 op=UNLOAD Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit: BPF prog-id=63 op=LOAD Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.579000 audit: BPF prog-id=64 op=LOAD Oct 2 18:50:17.579000 audit: BPF prog-id=48 op=UNLOAD Oct 2 18:50:17.579000 audit: BPF prog-id=49 op=UNLOAD Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.586000 audit: BPF prog-id=65 op=LOAD Oct 2 18:50:17.586000 audit: BPF prog-id=50 op=UNLOAD Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:17.589000 audit: BPF prog-id=66 op=LOAD Oct 2 18:50:17.589000 audit: BPF prog-id=51 op=UNLOAD Oct 2 18:50:17.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.626429 systemd[1]: Started kubelet.service. Oct 2 18:50:17.782621 kubelet[2407]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:17.783272 kubelet[2407]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 18:50:17.783393 kubelet[2407]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:17.784005 kubelet[2407]: I1002 18:50:17.783932 2407 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:50:18.356116 kubelet[2407]: I1002 18:50:18.356068 2407 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 18:50:18.356343 kubelet[2407]: I1002 18:50:18.356314 2407 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:50:18.357005 kubelet[2407]: I1002 18:50:18.356963 2407 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 18:50:18.367349 kubelet[2407]: E1002 18:50:18.367287 2407 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.28.180:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.367504 kubelet[2407]: I1002 18:50:18.367408 2407 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:50:18.371335 kubelet[2407]: W1002 18:50:18.371295 2407 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:50:18.373175 kubelet[2407]: I1002 18:50:18.373106 2407 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:50:18.374186 kubelet[2407]: I1002 18:50:18.374151 2407 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:50:18.374461 kubelet[2407]: I1002 18:50:18.374438 2407 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 18:50:18.374742 kubelet[2407]: I1002 18:50:18.374719 2407 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 18:50:18.374892 kubelet[2407]: I1002 18:50:18.374838 2407 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 18:50:18.375177 kubelet[2407]: I1002 18:50:18.375154 2407 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:18.386497 kubelet[2407]: I1002 18:50:18.386453 2407 kubelet.go:405] "Attempting to sync node with API server" Oct 2 18:50:18.386722 kubelet[2407]: I1002 18:50:18.386695 2407 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:50:18.387060 kubelet[2407]: I1002 18:50:18.387033 2407 kubelet.go:309] "Adding apiserver pod source" Oct 2 18:50:18.387278 kubelet[2407]: I1002 18:50:18.387252 2407 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:50:18.387521 kubelet[2407]: W1002 18:50:18.387442 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.28.180:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-180&limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.387615 kubelet[2407]: E1002 18:50:18.387534 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.180:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-180&limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.389527 kubelet[2407]: I1002 18:50:18.389485 2407 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:50:18.390652 kubelet[2407]: W1002 18:50:18.390603 2407 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 18:50:18.392323 kubelet[2407]: I1002 18:50:18.392267 2407 server.go:1168] "Started kubelet" Oct 2 18:50:18.392735 kubelet[2407]: W1002 18:50:18.392661 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.28.180:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.393014 kubelet[2407]: E1002 18:50:18.392980 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.180:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.396000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:18.396000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:18.396000 audit[2407]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bc7440 a1=4000bfca98 a2=4000bc7410 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.396000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:18.398480 kubelet[2407]: E1002 18:50:18.397970 2407 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-28-180.178a5ef58d7d81b2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-28-180", UID:"ip-172-31-28-180", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-28-180"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 392224178, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 392224178, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.28.180:6443/api/v1/namespaces/default/events": dial tcp 172.31.28.180:6443: connect: connection refused'(may retry after sleeping) Oct 2 18:50:18.398950 kubelet[2407]: I1002 18:50:18.398907 2407 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:50:18.398000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:18.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:18.398000 audit[2407]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c10940 a1=4000bfcab0 a2=4000bc74d0 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.398000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:18.399604 kubelet[2407]: E1002 18:50:18.399259 2407 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:50:18.399604 kubelet[2407]: E1002 18:50:18.399303 2407 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:50:18.399928 kubelet[2407]: I1002 18:50:18.399892 2407 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:50:18.400540 kubelet[2407]: I1002 18:50:18.400493 2407 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:50:18.401275 kubelet[2407]: I1002 18:50:18.400717 2407 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:50:18.402645 kubelet[2407]: I1002 18:50:18.402549 2407 server.go:461] "Adding debug handlers to kubelet server" Oct 2 18:50:18.407952 kubelet[2407]: I1002 18:50:18.400813 2407 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 18:50:18.410103 kubelet[2407]: I1002 18:50:18.408474 2407 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 18:50:18.410103 kubelet[2407]: I1002 18:50:18.408640 2407 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 18:50:18.410103 kubelet[2407]: W1002 18:50:18.409262 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.28.180:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.410103 kubelet[2407]: E1002 18:50:18.409344 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.180:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.410103 kubelet[2407]: E1002 18:50:18.409958 2407 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.180:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-180?timeout=10s\": dial tcp 172.31.28.180:6443: connect: connection refused" interval="200ms" Oct 2 18:50:18.416000 audit[2418]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.416000 audit[2418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff47213a0 a2=0 a3=1 items=0 ppid=2407 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:50:18.421000 audit[2419]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.421000 audit[2419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3152660 a2=0 a3=1 items=0 ppid=2407 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:50:18.449000 audit[2422]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.449000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcacb1d50 a2=0 a3=1 items=0 ppid=2407 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:18.457000 audit[2425]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.457000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe655c140 a2=0 a3=1 items=0 ppid=2407 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:18.462915 kubelet[2407]: I1002 18:50:18.462835 2407 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 18:50:18.463170 kubelet[2407]: I1002 18:50:18.463143 2407 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 18:50:18.463346 kubelet[2407]: I1002 18:50:18.463321 2407 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:18.466424 kubelet[2407]: I1002 18:50:18.466371 2407 policy_none.go:49] "None policy: Start" Oct 2 18:50:18.468071 kubelet[2407]: I1002 18:50:18.468018 2407 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 18:50:18.468071 kubelet[2407]: I1002 18:50:18.468077 2407 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:50:18.482000 audit[2429]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.482000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe58b0aa0 a2=0 a3=1 items=0 ppid=2407 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 18:50:18.484392 systemd[1]: Created slice kubepods.slice. Oct 2 18:50:18.485540 kubelet[2407]: I1002 18:50:18.483600 2407 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 18:50:18.492000 audit[2432]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.492000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff6478a0 a2=0 a3=1 items=0 ppid=2407 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:50:18.493000 audit[2431]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:18.493000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd27dfc30 a2=0 a3=1 items=0 ppid=2407 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:50:18.494964 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 18:50:18.498648 kubelet[2407]: I1002 18:50:18.498549 2407 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 18:50:18.498801 kubelet[2407]: I1002 18:50:18.498664 2407 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 18:50:18.498801 kubelet[2407]: I1002 18:50:18.498699 2407 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 18:50:18.498801 kubelet[2407]: E1002 18:50:18.498786 2407 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 18:50:18.499000 audit[2433]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.499000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdadff40 a2=0 a3=1 items=0 ppid=2407 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:50:18.500688 kubelet[2407]: W1002 18:50:18.500612 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.28.180:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.500828 kubelet[2407]: E1002 18:50:18.500693 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.180:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:18.507441 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 18:50:18.507000 audit[2434]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:18.507000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1b344b0 a2=0 a3=1 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:50:18.511000 audit[2435]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:18.511000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcacaa440 a2=0 a3=1 items=0 ppid=2407 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:50:18.516538 kubelet[2407]: I1002 18:50:18.516504 2407 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:18.517311 kubelet[2407]: E1002 18:50:18.517274 2407 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.28.180:6443/api/v1/nodes\": dial tcp 172.31.28.180:6443: connect: connection refused" node="ip-172-31-28-180" Oct 2 18:50:18.518000 audit[2438]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:18.518000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc0d53290 a2=0 a3=1 items=0 ppid=2407 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:50:18.523000 audit[2439]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:18.523000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8fe9a70 a2=0 a3=1 items=0 ppid=2407 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:50:18.527421 kubelet[2407]: I1002 18:50:18.527371 2407 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:50:18.526000 audit[2407]: AVC avc: denied { mac_admin } for pid=2407 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:18.526000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:18.526000 audit[2407]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010432f0 a1=4001023bd8 a2=40010432c0 a3=25 items=0 ppid=1 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:18.526000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:18.528015 kubelet[2407]: I1002 18:50:18.527539 2407 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:50:18.528015 kubelet[2407]: I1002 18:50:18.527918 2407 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:50:18.531450 kubelet[2407]: E1002 18:50:18.531417 2407 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-28-180\" not found" Oct 2 18:50:18.599815 kubelet[2407]: I1002 18:50:18.599773 2407 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:18.602462 kubelet[2407]: I1002 18:50:18.602418 2407 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:18.604562 kubelet[2407]: I1002 18:50:18.604517 2407 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:18.612195 kubelet[2407]: E1002 18:50:18.611996 2407 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.180:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-180?timeout=10s\": dial tcp 172.31.28.180:6443: connect: connection refused" interval="400ms" Oct 2 18:50:18.626199 systemd[1]: Created slice kubepods-burstable-pod99a1c2b916f15c480b41cd9a56b68e92.slice. Oct 2 18:50:18.651024 systemd[1]: Created slice kubepods-burstable-pod222027a7bf5afd6d12efd7d1c7cd0f45.slice. Oct 2 18:50:18.661154 systemd[1]: Created slice kubepods-burstable-poda4e755d197e830dec67ff764cee90906.slice. Oct 2 18:50:18.709691 kubelet[2407]: I1002 18:50:18.709632 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-ca-certs\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:18.709931 kubelet[2407]: I1002 18:50:18.709742 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:18.709931 kubelet[2407]: I1002 18:50:18.709828 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:18.709931 kubelet[2407]: I1002 18:50:18.709914 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:18.710109 kubelet[2407]: I1002 18:50:18.709991 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:18.710109 kubelet[2407]: I1002 18:50:18.710061 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:18.710245 kubelet[2407]: I1002 18:50:18.710110 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:18.710245 kubelet[2407]: I1002 18:50:18.710180 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:18.710361 kubelet[2407]: I1002 18:50:18.710259 2407 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/222027a7bf5afd6d12efd7d1c7cd0f45-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-180\" (UID: \"222027a7bf5afd6d12efd7d1c7cd0f45\") " pod="kube-system/kube-scheduler-ip-172-31-28-180" Oct 2 18:50:18.719816 kubelet[2407]: I1002 18:50:18.719779 2407 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:18.720587 kubelet[2407]: E1002 18:50:18.720550 2407 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.28.180:6443/api/v1/nodes\": dial tcp 172.31.28.180:6443: connect: connection refused" node="ip-172-31-28-180" Oct 2 18:50:18.949298 env[1731]: time="2023-10-02T18:50:18.949193259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-180,Uid:99a1c2b916f15c480b41cd9a56b68e92,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:18.962620 env[1731]: time="2023-10-02T18:50:18.962501711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-180,Uid:222027a7bf5afd6d12efd7d1c7cd0f45,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:18.968985 env[1731]: time="2023-10-02T18:50:18.968558927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-180,Uid:a4e755d197e830dec67ff764cee90906,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:19.013525 kubelet[2407]: E1002 18:50:19.013453 2407 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.180:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-180?timeout=10s\": dial tcp 172.31.28.180:6443: connect: connection refused" interval="800ms" Oct 2 18:50:19.123311 kubelet[2407]: I1002 18:50:19.123250 2407 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:19.123831 kubelet[2407]: E1002 18:50:19.123790 2407 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.28.180:6443/api/v1/nodes\": dial tcp 172.31.28.180:6443: connect: connection refused" node="ip-172-31-28-180" Oct 2 18:50:19.240697 kubelet[2407]: W1002 18:50:19.240464 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.28.180:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.240697 kubelet[2407]: E1002 18:50:19.240565 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.180:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.421214 kubelet[2407]: W1002 18:50:19.421074 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.28.180:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.421214 kubelet[2407]: E1002 18:50:19.421169 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.180:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.470216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3470238148.mount: Deactivated successfully. Oct 2 18:50:19.479497 env[1731]: time="2023-10-02T18:50:19.479435893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.485427 env[1731]: time="2023-10-02T18:50:19.485345881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.488225 env[1731]: time="2023-10-02T18:50:19.488164374Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.490797 env[1731]: time="2023-10-02T18:50:19.490640591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.497371 env[1731]: time="2023-10-02T18:50:19.497314034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.499983 env[1731]: time="2023-10-02T18:50:19.499924111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.501889 env[1731]: time="2023-10-02T18:50:19.501777658Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.510260 env[1731]: time="2023-10-02T18:50:19.510196437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.518647 env[1731]: time="2023-10-02T18:50:19.518586182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.521625 env[1731]: time="2023-10-02T18:50:19.521568072Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.523982 env[1731]: time="2023-10-02T18:50:19.523917787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.550786 env[1731]: time="2023-10-02T18:50:19.550676356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:19.588057 env[1731]: time="2023-10-02T18:50:19.581215761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:19.588351 env[1731]: time="2023-10-02T18:50:19.588230939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:19.588608 env[1731]: time="2023-10-02T18:50:19.588489561Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:19.590086 env[1731]: time="2023-10-02T18:50:19.589676955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53754ac8492112da604044f19c2c18eb3a58cf1e3310551585cb16853f8c21ef pid=2446 runtime=io.containerd.runc.v2 Oct 2 18:50:19.613435 env[1731]: time="2023-10-02T18:50:19.613283431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:19.613607 env[1731]: time="2023-10-02T18:50:19.613455313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:19.613607 env[1731]: time="2023-10-02T18:50:19.613546865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:19.614314 env[1731]: time="2023-10-02T18:50:19.614216116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db9378857833168ce001c601d68fe320a9eaad0a83af17473e0aef260054fcc5 pid=2466 runtime=io.containerd.runc.v2 Oct 2 18:50:19.634214 systemd[1]: Started cri-containerd-53754ac8492112da604044f19c2c18eb3a58cf1e3310551585cb16853f8c21ef.scope. Oct 2 18:50:19.657782 env[1731]: time="2023-10-02T18:50:19.657622704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:19.657961 env[1731]: time="2023-10-02T18:50:19.657796135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:19.657961 env[1731]: time="2023-10-02T18:50:19.657892056Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:19.658714 env[1731]: time="2023-10-02T18:50:19.658594048Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ecc61b19a0f265f426252f1f83daa1c33f236ecac7ebb3458d41e8efb79969a pid=2490 runtime=io.containerd.runc.v2 Oct 2 18:50:19.664020 kubelet[2407]: W1002 18:50:19.663824 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.28.180:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-180&limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.664020 kubelet[2407]: E1002 18:50:19.663985 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.180:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-180&limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.685210 systemd[1]: Started cri-containerd-db9378857833168ce001c601d68fe320a9eaad0a83af17473e0aef260054fcc5.scope. Oct 2 18:50:19.728638 systemd[1]: Started cri-containerd-6ecc61b19a0f265f426252f1f83daa1c33f236ecac7ebb3458d41e8efb79969a.scope. Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.743000 audit: BPF prog-id=67 op=LOAD Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001cdb38 a2=10 a3=0 items=0 ppid=2446 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373534616338343932313132646136303430343466313963326331 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=2446 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373534616338343932313132646136303430343466313963326331 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.745000 audit: BPF prog-id=68 op=LOAD Oct 2 18:50:19.745000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cd8e0 a2=78 a3=0 items=0 ppid=2446 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373534616338343932313132646136303430343466313963326331 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.747000 audit: BPF prog-id=69 op=LOAD Oct 2 18:50:19.747000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001cd670 a2=78 a3=0 items=0 ppid=2446 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373534616338343932313132646136303430343466313963326331 Oct 2 18:50:19.748000 audit: BPF prog-id=69 op=UNLOAD Oct 2 18:50:19.749000 audit: BPF prog-id=68 op=UNLOAD Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.749000 audit: BPF prog-id=70 op=LOAD Oct 2 18:50:19.749000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cdb40 a2=78 a3=0 items=0 ppid=2446 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533373534616338343932313132646136303430343466313963326331 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.755000 audit: BPF prog-id=71 op=LOAD Oct 2 18:50:19.757000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.757000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2466 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393337383835373833333136386365303031633630316436386665 Oct 2 18:50:19.757000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.757000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2466 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393337383835373833333136386365303031633630316436386665 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.759000 audit: BPF prog-id=72 op=LOAD Oct 2 18:50:19.759000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2466 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393337383835373833333136386365303031633630316436386665 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.760000 audit: BPF prog-id=73 op=LOAD Oct 2 18:50:19.760000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2466 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393337383835373833333136386365303031633630316436386665 Oct 2 18:50:19.761000 audit: BPF prog-id=73 op=UNLOAD Oct 2 18:50:19.765000 audit: BPF prog-id=72 op=UNLOAD Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.765000 audit: BPF prog-id=74 op=LOAD Oct 2 18:50:19.765000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2466 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462393337383835373833333136386365303031633630316436386665 Oct 2 18:50:19.787281 kubelet[2407]: W1002 18:50:19.787169 2407 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.28.180:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.787281 kubelet[2407]: E1002 18:50:19.787272 2407 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.180:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.788000 audit: BPF prog-id=75 op=LOAD Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2490 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636336316231396130663236356634323632353266316638336461 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2490 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636336316231396130663236356634323632353266316638336461 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.789000 audit: BPF prog-id=76 op=LOAD Oct 2 18:50:19.789000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2490 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636336316231396130663236356634323632353266316638336461 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit: BPF prog-id=77 op=LOAD Oct 2 18:50:19.790000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2490 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636336316231396130663236356634323632353266316638336461 Oct 2 18:50:19.790000 audit: BPF prog-id=77 op=UNLOAD Oct 2 18:50:19.790000 audit: BPF prog-id=76 op=UNLOAD Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:19.790000 audit: BPF prog-id=78 op=LOAD Oct 2 18:50:19.790000 audit[2508]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2490 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665636336316231396130663236356634323632353266316638336461 Oct 2 18:50:19.814976 kubelet[2407]: E1002 18:50:19.814904 2407 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.180:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-180?timeout=10s\": dial tcp 172.31.28.180:6443: connect: connection refused" interval="1.6s" Oct 2 18:50:19.862161 env[1731]: time="2023-10-02T18:50:19.862074593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-180,Uid:99a1c2b916f15c480b41cd9a56b68e92,Namespace:kube-system,Attempt:0,} returns sandbox id \"53754ac8492112da604044f19c2c18eb3a58cf1e3310551585cb16853f8c21ef\"" Oct 2 18:50:19.873306 env[1731]: time="2023-10-02T18:50:19.873227478Z" level=info msg="CreateContainer within sandbox \"53754ac8492112da604044f19c2c18eb3a58cf1e3310551585cb16853f8c21ef\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 18:50:19.879240 env[1731]: time="2023-10-02T18:50:19.879155073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-180,Uid:222027a7bf5afd6d12efd7d1c7cd0f45,Namespace:kube-system,Attempt:0,} returns sandbox id \"db9378857833168ce001c601d68fe320a9eaad0a83af17473e0aef260054fcc5\"" Oct 2 18:50:19.884308 env[1731]: time="2023-10-02T18:50:19.884229545Z" level=info msg="CreateContainer within sandbox \"db9378857833168ce001c601d68fe320a9eaad0a83af17473e0aef260054fcc5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 18:50:19.892103 env[1731]: time="2023-10-02T18:50:19.892027478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-180,Uid:a4e755d197e830dec67ff764cee90906,Namespace:kube-system,Attempt:0,} returns sandbox id \"6ecc61b19a0f265f426252f1f83daa1c33f236ecac7ebb3458d41e8efb79969a\"" Oct 2 18:50:19.898291 env[1731]: time="2023-10-02T18:50:19.898223980Z" level=info msg="CreateContainer within sandbox \"6ecc61b19a0f265f426252f1f83daa1c33f236ecac7ebb3458d41e8efb79969a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 18:50:19.912449 env[1731]: time="2023-10-02T18:50:19.912366809Z" level=info msg="CreateContainer within sandbox \"53754ac8492112da604044f19c2c18eb3a58cf1e3310551585cb16853f8c21ef\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a79b7ca6e736a20b4a7a1bc116320677cdcae40d80cb266924322342c4ab9165\"" Oct 2 18:50:19.913729 env[1731]: time="2023-10-02T18:50:19.913676420Z" level=info msg="StartContainer for \"a79b7ca6e736a20b4a7a1bc116320677cdcae40d80cb266924322342c4ab9165\"" Oct 2 18:50:19.926635 kubelet[2407]: I1002 18:50:19.926588 2407 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:19.927169 kubelet[2407]: E1002 18:50:19.927110 2407 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.28.180:6443/api/v1/nodes\": dial tcp 172.31.28.180:6443: connect: connection refused" node="ip-172-31-28-180" Oct 2 18:50:19.928582 env[1731]: time="2023-10-02T18:50:19.928514424Z" level=info msg="CreateContainer within sandbox \"db9378857833168ce001c601d68fe320a9eaad0a83af17473e0aef260054fcc5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6ab09a71cbfa0682e0454ee60284eb0b15978420855b479cb9965c62a6606bf5\"" Oct 2 18:50:19.929719 env[1731]: time="2023-10-02T18:50:19.929663783Z" level=info msg="StartContainer for \"6ab09a71cbfa0682e0454ee60284eb0b15978420855b479cb9965c62a6606bf5\"" Oct 2 18:50:19.936097 env[1731]: time="2023-10-02T18:50:19.936030115Z" level=info msg="CreateContainer within sandbox \"6ecc61b19a0f265f426252f1f83daa1c33f236ecac7ebb3458d41e8efb79969a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"937ffd615a102fc44d5dce863e68481c541d794a294fc736a8e51390adbd4dea\"" Oct 2 18:50:19.937232 env[1731]: time="2023-10-02T18:50:19.937118480Z" level=info msg="StartContainer for \"937ffd615a102fc44d5dce863e68481c541d794a294fc736a8e51390adbd4dea\"" Oct 2 18:50:19.990872 systemd[1]: Started cri-containerd-a79b7ca6e736a20b4a7a1bc116320677cdcae40d80cb266924322342c4ab9165.scope. Oct 2 18:50:20.015371 systemd[1]: Started cri-containerd-6ab09a71cbfa0682e0454ee60284eb0b15978420855b479cb9965c62a6606bf5.scope. Oct 2 18:50:20.055691 systemd[1]: Started cri-containerd-937ffd615a102fc44d5dce863e68481c541d794a294fc736a8e51390adbd4dea.scope. Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.068000 audit: BPF prog-id=79 op=LOAD Oct 2 18:50:20.069000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.069000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c1b38 a2=10 a3=0 items=0 ppid=2446 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396237636136653733366132306234613761316263313136333230 Oct 2 18:50:20.069000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.069000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c15a0 a2=3c a3=0 items=0 ppid=2446 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396237636136653733366132306234613761316263313136333230 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit: BPF prog-id=80 op=LOAD Oct 2 18:50:20.070000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c18e0 a2=78 a3=0 items=0 ppid=2446 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396237636136653733366132306234613761316263313136333230 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit: BPF prog-id=81 op=LOAD Oct 2 18:50:20.070000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c1670 a2=78 a3=0 items=0 ppid=2446 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396237636136653733366132306234613761316263313136333230 Oct 2 18:50:20.070000 audit: BPF prog-id=81 op=UNLOAD Oct 2 18:50:20.070000 audit: BPF prog-id=80 op=UNLOAD Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.070000 audit: BPF prog-id=82 op=LOAD Oct 2 18:50:20.070000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c1b40 a2=78 a3=0 items=0 ppid=2446 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396237636136653733366132306234613761316263313136333230 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.131000 audit: BPF prog-id=83 op=LOAD Oct 2 18:50:20.133000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.133000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2466 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623039613731636266613036383265303435346565363032383465 Oct 2 18:50:20.133000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.133000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2466 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623039613731636266613036383265303435346565363032383465 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit: BPF prog-id=84 op=LOAD Oct 2 18:50:20.134000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2466 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623039613731636266613036383265303435346565363032383465 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit: BPF prog-id=85 op=LOAD Oct 2 18:50:20.134000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2466 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623039613731636266613036383265303435346565363032383465 Oct 2 18:50:20.134000 audit: BPF prog-id=85 op=UNLOAD Oct 2 18:50:20.134000 audit: BPF prog-id=84 op=UNLOAD Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.134000 audit: BPF prog-id=86 op=LOAD Oct 2 18:50:20.134000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2466 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661623039613731636266613036383265303435346565363032383465 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.163000 audit: BPF prog-id=87 op=LOAD Oct 2 18:50:20.164000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.164000 audit[2597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2490 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933376666643631356131303266633434643564636538363365363834 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2490 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933376666643631356131303266633434643564636538363365363834 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.165000 audit: BPF prog-id=88 op=LOAD Oct 2 18:50:20.165000 audit[2597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2490 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933376666643631356131303266633434643564636538363365363834 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.167000 audit: BPF prog-id=89 op=LOAD Oct 2 18:50:20.167000 audit[2597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2490 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933376666643631356131303266633434643564636538363365363834 Oct 2 18:50:20.168000 audit: BPF prog-id=89 op=UNLOAD Oct 2 18:50:20.168000 audit: BPF prog-id=88 op=UNLOAD Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { perfmon } for pid=2597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit[2597]: AVC avc: denied { bpf } for pid=2597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:20.168000 audit: BPF prog-id=90 op=LOAD Oct 2 18:50:20.168000 audit[2597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2490 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:20.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933376666643631356131303266633434643564636538363365363834 Oct 2 18:50:20.190034 env[1731]: time="2023-10-02T18:50:20.189974342Z" level=info msg="StartContainer for \"a79b7ca6e736a20b4a7a1bc116320677cdcae40d80cb266924322342c4ab9165\" returns successfully" Oct 2 18:50:20.226232 env[1731]: time="2023-10-02T18:50:20.226157293Z" level=info msg="StartContainer for \"6ab09a71cbfa0682e0454ee60284eb0b15978420855b479cb9965c62a6606bf5\" returns successfully" Oct 2 18:50:20.264310 env[1731]: time="2023-10-02T18:50:20.264165485Z" level=info msg="StartContainer for \"937ffd615a102fc44d5dce863e68481c541d794a294fc736a8e51390adbd4dea\" returns successfully" Oct 2 18:50:20.455596 kubelet[2407]: E1002 18:50:20.455533 2407 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.28.180:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.28.180:6443: connect: connection refused Oct 2 18:50:21.531487 kubelet[2407]: I1002 18:50:21.531424 2407 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:24.143000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.146471 kernel: kauditd_printk_skb: 557 callbacks suppressed Oct 2 18:50:24.146533 kernel: audit: type=1400 audit(1696272624.143:715): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.143000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003a9d560 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.172207 kernel: audit: type=1300 audit(1696272624.143:715): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003a9d560 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.187910 kernel: audit: type=1327 audit(1696272624.143:715): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.156000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.198014 kernel: audit: type=1400 audit(1696272624.156:716): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.156000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=400566a140 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.210549 kernel: audit: type=1300 audit(1696272624.156:716): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=400566a140 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.221158 kernel: audit: type=1327 audit(1696272624.156:716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.159000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6819 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.231275 kernel: audit: type=1400 audit(1696272624.159:717): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6819 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.159000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003a9d680 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.243878 kernel: audit: type=1300 audit(1696272624.159:717): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003a9d680 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.159000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.260265 kernel: audit: type=1327 audit(1696272624.159:717): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.187000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.273712 kernel: audit: type=1400 audit(1696272624.187:718): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.187000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4003ad3ec0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.215000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.215000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=40068509e0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.215000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:24.215000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=400375b020 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:50:24.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:24.396373 update_engine[1724]: I1002 18:50:24.394901 1724 update_attempter.cc:505] Updating boot flags... Oct 2 18:50:25.186759 kubelet[2407]: E1002 18:50:25.186703 2407 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-28-180\" not found" node="ip-172-31-28-180" Oct 2 18:50:25.223565 kubelet[2407]: I1002 18:50:25.223499 2407 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-28-180" Oct 2 18:50:25.284506 kubelet[2407]: E1002 18:50:25.284299 2407 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-28-180.178a5ef58d7d81b2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-28-180", UID:"ip-172-31-28-180", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-28-180"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 392224178, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 392224178, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:50:25.303000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:25.303000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000144120 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:25.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:25.304000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:25.304000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000511a0 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:25.304000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:25.375986 kubelet[2407]: E1002 18:50:25.375785 2407 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-28-180.178a5ef58de942ad", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-28-180", UID:"ip-172-31-28-180", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-28-180"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 399285933, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 50, 18, 399285933, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:50:25.408135 kubelet[2407]: I1002 18:50:25.408079 2407 apiserver.go:52] "Watching apiserver" Oct 2 18:50:25.509076 kubelet[2407]: I1002 18:50:25.509032 2407 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 18:50:25.577368 kubelet[2407]: I1002 18:50:25.577322 2407 reconciler.go:41] "Reconciler: start to sync state" Oct 2 18:50:27.827471 systemd[1]: Reloading. Oct 2 18:50:28.140554 /usr/lib/systemd/system-generators/torcx-generator[2793]: time="2023-10-02T18:50:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:50:28.140624 /usr/lib/systemd/system-generators/torcx-generator[2793]: time="2023-10-02T18:50:28Z" level=info msg="torcx already run" Oct 2 18:50:28.410032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:50:28.410075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:50:28.461636 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:50:28.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.678000 audit: BPF prog-id=91 op=LOAD Oct 2 18:50:28.678000 audit: BPF prog-id=52 op=UNLOAD Oct 2 18:50:28.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.679000 audit: BPF prog-id=92 op=LOAD Oct 2 18:50:28.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.683000 audit: BPF prog-id=93 op=LOAD Oct 2 18:50:28.683000 audit: BPF prog-id=53 op=UNLOAD Oct 2 18:50:28.684000 audit: BPF prog-id=54 op=UNLOAD Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.688000 audit: BPF prog-id=94 op=LOAD Oct 2 18:50:28.688000 audit: BPF prog-id=83 op=UNLOAD Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.690000 audit: BPF prog-id=95 op=LOAD Oct 2 18:50:28.690000 audit: BPF prog-id=87 op=UNLOAD Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.693000 audit: BPF prog-id=96 op=LOAD Oct 2 18:50:28.693000 audit: BPF prog-id=55 op=UNLOAD Oct 2 18:50:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit: BPF prog-id=97 op=LOAD Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.694000 audit: BPF prog-id=98 op=LOAD Oct 2 18:50:28.694000 audit: BPF prog-id=56 op=UNLOAD Oct 2 18:50:28.694000 audit: BPF prog-id=57 op=UNLOAD Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.696000 audit: BPF prog-id=99 op=LOAD Oct 2 18:50:28.696000 audit: BPF prog-id=58 op=UNLOAD Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.698000 audit: BPF prog-id=100 op=LOAD Oct 2 18:50:28.698000 audit: BPF prog-id=59 op=UNLOAD Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.700000 audit: BPF prog-id=101 op=LOAD Oct 2 18:50:28.700000 audit: BPF prog-id=67 op=UNLOAD Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit: BPF prog-id=102 op=LOAD Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.703000 audit: BPF prog-id=103 op=LOAD Oct 2 18:50:28.703000 audit: BPF prog-id=60 op=UNLOAD Oct 2 18:50:28.703000 audit: BPF prog-id=61 op=UNLOAD Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit: BPF prog-id=104 op=LOAD Oct 2 18:50:28.704000 audit: BPF prog-id=62 op=UNLOAD Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit: BPF prog-id=105 op=LOAD Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.705000 audit: BPF prog-id=106 op=LOAD Oct 2 18:50:28.705000 audit: BPF prog-id=63 op=UNLOAD Oct 2 18:50:28.705000 audit: BPF prog-id=64 op=UNLOAD Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.707000 audit: BPF prog-id=107 op=LOAD Oct 2 18:50:28.707000 audit: BPF prog-id=75 op=UNLOAD Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.709000 audit: BPF prog-id=108 op=LOAD Oct 2 18:50:28.709000 audit: BPF prog-id=71 op=UNLOAD Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.710000 audit: BPF prog-id=109 op=LOAD Oct 2 18:50:28.711000 audit: BPF prog-id=79 op=UNLOAD Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.715000 audit: BPF prog-id=110 op=LOAD Oct 2 18:50:28.715000 audit: BPF prog-id=65 op=UNLOAD Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:28.719000 audit: BPF prog-id=111 op=LOAD Oct 2 18:50:28.719000 audit: BPF prog-id=66 op=UNLOAD Oct 2 18:50:28.760794 kubelet[2407]: I1002 18:50:28.755487 2407 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:50:28.755780 systemd[1]: Stopping kubelet.service... Oct 2 18:50:28.781793 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 18:50:28.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:28.782303 systemd[1]: Stopped kubelet.service. Oct 2 18:50:28.782401 systemd[1]: kubelet.service: Consumed 1.385s CPU time. Oct 2 18:50:28.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:28.786363 systemd[1]: Started kubelet.service. Oct 2 18:50:28.993575 kubelet[2850]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:28.994228 kubelet[2850]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 18:50:28.994343 kubelet[2850]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:28.994750 kubelet[2850]: I1002 18:50:28.994685 2850 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:50:29.009892 kubelet[2850]: I1002 18:50:29.009821 2850 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 18:50:29.010101 kubelet[2850]: I1002 18:50:29.010079 2850 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:50:29.010732 kubelet[2850]: I1002 18:50:29.010696 2850 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 18:50:29.014391 kubelet[2850]: I1002 18:50:29.014354 2850 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 18:50:29.019098 kubelet[2850]: I1002 18:50:29.019057 2850 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:50:29.023337 kubelet[2850]: W1002 18:50:29.023300 2850 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:50:29.025254 kubelet[2850]: I1002 18:50:29.025192 2850 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:50:29.026213 kubelet[2850]: I1002 18:50:29.026187 2850 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:50:29.026468 kubelet[2850]: I1002 18:50:29.026444 2850 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 18:50:29.026793 kubelet[2850]: I1002 18:50:29.026767 2850 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 18:50:29.026989 kubelet[2850]: I1002 18:50:29.026966 2850 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 18:50:29.027199 kubelet[2850]: I1002 18:50:29.027177 2850 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:29.039275 kubelet[2850]: I1002 18:50:29.039238 2850 kubelet.go:405] "Attempting to sync node with API server" Oct 2 18:50:29.039591 kubelet[2850]: I1002 18:50:29.039565 2850 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:50:29.039864 kubelet[2850]: I1002 18:50:29.039830 2850 kubelet.go:309] "Adding apiserver pod source" Oct 2 18:50:29.040045 kubelet[2850]: I1002 18:50:29.040024 2850 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:50:29.045765 kubelet[2850]: I1002 18:50:29.045727 2850 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:50:29.049732 kubelet[2850]: I1002 18:50:29.049692 2850 server.go:1168] "Started kubelet" Oct 2 18:50:29.055000 audit[2850]: AVC avc: denied { mac_admin } for pid=2850 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:29.055000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:29.055000 audit[2850]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400092f6b0 a1=40004d57b8 a2=400092f680 a3=25 items=0 ppid=1 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:29.055000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:29.058420 kubelet[2850]: I1002 18:50:29.058378 2850 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:50:29.058000 audit[2850]: AVC avc: denied { mac_admin } for pid=2850 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:29.058000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:29.058000 audit[2850]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008dcc80 a1=40004d57d0 a2=400092f740 a3=25 items=0 ppid=1 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:29.058000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:29.059488 kubelet[2850]: I1002 18:50:29.059454 2850 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:50:29.059719 kubelet[2850]: I1002 18:50:29.059696 2850 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:50:29.062381 kubelet[2850]: E1002 18:50:29.062344 2850 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:50:29.062598 kubelet[2850]: E1002 18:50:29.062575 2850 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:50:29.067486 kubelet[2850]: I1002 18:50:29.067434 2850 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 18:50:29.069465 kubelet[2850]: I1002 18:50:29.069422 2850 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 18:50:29.079181 kubelet[2850]: I1002 18:50:29.079139 2850 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:50:29.083809 kubelet[2850]: I1002 18:50:29.083764 2850 server.go:461] "Adding debug handlers to kubelet server" Oct 2 18:50:29.100018 kubelet[2850]: I1002 18:50:29.099983 2850 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 18:50:29.223903 kubelet[2850]: I1002 18:50:29.223868 2850 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 18:50:29.233004 kubelet[2850]: I1002 18:50:29.232939 2850 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-28-180" Oct 2 18:50:29.236964 kubelet[2850]: I1002 18:50:29.236928 2850 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 18:50:29.237277 kubelet[2850]: I1002 18:50:29.237249 2850 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 18:50:29.237461 kubelet[2850]: I1002 18:50:29.237436 2850 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 18:50:29.237710 kubelet[2850]: E1002 18:50:29.237689 2850 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 18:50:29.276051 kubelet[2850]: I1002 18:50:29.273736 2850 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-28-180" Oct 2 18:50:29.280230 kubelet[2850]: I1002 18:50:29.280196 2850 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-28-180" Oct 2 18:50:29.338522 kubelet[2850]: E1002 18:50:29.338456 2850 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 18:50:29.432154 kubelet[2850]: I1002 18:50:29.432119 2850 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 18:50:29.432410 kubelet[2850]: I1002 18:50:29.432388 2850 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 18:50:29.432551 kubelet[2850]: I1002 18:50:29.432532 2850 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:29.433048 kubelet[2850]: I1002 18:50:29.433015 2850 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 18:50:29.433183 kubelet[2850]: I1002 18:50:29.433163 2850 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 18:50:29.433311 kubelet[2850]: I1002 18:50:29.433291 2850 policy_none.go:49] "None policy: Start" Oct 2 18:50:29.435936 kubelet[2850]: I1002 18:50:29.435884 2850 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 18:50:29.436079 kubelet[2850]: I1002 18:50:29.435968 2850 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:50:29.436893 kubelet[2850]: I1002 18:50:29.436415 2850 state_mem.go:75] "Updated machine memory state" Oct 2 18:50:29.446680 kubelet[2850]: I1002 18:50:29.446605 2850 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:50:29.445000 audit[2850]: AVC avc: denied { mac_admin } for pid=2850 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:29.448818 kernel: kauditd_printk_skb: 268 callbacks suppressed Oct 2 18:50:29.448991 kernel: audit: type=1400 audit(1696272629.445:971): avc: denied { mac_admin } for pid=2850 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:29.457138 kubelet[2850]: I1002 18:50:29.457082 2850 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:50:29.445000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:29.462460 kernel: audit: type=1401 audit(1696272629.445:971): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:29.463402 kubelet[2850]: I1002 18:50:29.463353 2850 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:50:29.445000 audit[2850]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40011bcc30 a1=40014123a8 a2=40011bcc00 a3=25 items=0 ppid=1 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:29.477383 kernel: audit: type=1300 audit(1696272629.445:971): arch=c00000b7 syscall=5 success=no exit=-22 a0=40011bcc30 a1=40014123a8 a2=40011bcc00 a3=25 items=0 ppid=1 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:29.492883 kernel: audit: type=1327 audit(1696272629.445:971): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:29.445000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:29.543148 kubelet[2850]: I1002 18:50:29.539498 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:29.543148 kubelet[2850]: I1002 18:50:29.539685 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:29.543148 kubelet[2850]: I1002 18:50:29.539768 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:29.579840 kubelet[2850]: I1002 18:50:29.579759 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:29.580012 kubelet[2850]: I1002 18:50:29.579878 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/222027a7bf5afd6d12efd7d1c7cd0f45-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-180\" (UID: \"222027a7bf5afd6d12efd7d1c7cd0f45\") " pod="kube-system/kube-scheduler-ip-172-31-28-180" Oct 2 18:50:29.580012 kubelet[2850]: I1002 18:50:29.579933 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:29.580012 kubelet[2850]: I1002 18:50:29.579982 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:29.580211 kubelet[2850]: I1002 18:50:29.580028 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-ca-certs\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:29.580211 kubelet[2850]: I1002 18:50:29.580077 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/99a1c2b916f15c480b41cd9a56b68e92-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-180\" (UID: \"99a1c2b916f15c480b41cd9a56b68e92\") " pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:29.580211 kubelet[2850]: I1002 18:50:29.580119 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:29.580211 kubelet[2850]: I1002 18:50:29.580162 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:29.580211 kubelet[2850]: I1002 18:50:29.580204 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a4e755d197e830dec67ff764cee90906-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-180\" (UID: \"a4e755d197e830dec67ff764cee90906\") " pod="kube-system/kube-controller-manager-ip-172-31-28-180" Oct 2 18:50:30.059596 kubelet[2850]: I1002 18:50:30.059546 2850 apiserver.go:52] "Watching apiserver" Oct 2 18:50:30.070970 kubelet[2850]: I1002 18:50:30.070900 2850 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 18:50:30.084096 kubelet[2850]: I1002 18:50:30.084041 2850 reconciler.go:41] "Reconciler: start to sync state" Oct 2 18:50:30.327981 kubelet[2850]: E1002 18:50:30.327812 2850 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-28-180\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-180" Oct 2 18:50:30.432028 kubelet[2850]: I1002 18:50:30.431962 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-28-180" podStartSLOduration=1.431800465 podCreationTimestamp="2023-10-02 18:50:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:30.406259222 +0000 UTC m=+1.592295795" watchObservedRunningTime="2023-10-02 18:50:30.431800465 +0000 UTC m=+1.617837026" Oct 2 18:50:30.459513 kubelet[2850]: I1002 18:50:30.459466 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-28-180" podStartSLOduration=1.459412651 podCreationTimestamp="2023-10-02 18:50:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:30.432530643 +0000 UTC m=+1.618567216" watchObservedRunningTime="2023-10-02 18:50:30.459412651 +0000 UTC m=+1.645449212" Oct 2 18:50:30.476899 kubelet[2850]: I1002 18:50:30.476839 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-28-180" podStartSLOduration=1.476744298 podCreationTimestamp="2023-10-02 18:50:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:30.460662831 +0000 UTC m=+1.646699392" watchObservedRunningTime="2023-10-02 18:50:30.476744298 +0000 UTC m=+1.662780847" Oct 2 18:50:31.217000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=6859 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:50:31.217000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b78680 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.247497 kernel: audit: type=1400 audit(1696272631.217:972): avc: denied { watch } for pid=2631 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=6859 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:50:31.247642 kernel: audit: type=1300 audit(1696272631.217:972): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b78680 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.268958 kernel: audit: type=1327 audit(1696272631.217:972): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.634000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:31.634000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cb7380 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.649003 kernel: audit: type=1400 audit(1696272631.634:973): avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:31.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.679549 kernel: audit: type=1300 audit(1696272631.634:973): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cb7380 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.679666 kernel: audit: type=1327 audit(1696272631.634:973): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.646000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:31.646000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cb75c0 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.662000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:31.662000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cb77e0 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:31.663000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:31.663000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cb7800 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:50:31.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:35.685548 sudo[1992]: pam_unix(sudo:session): session closed for user root Oct 2 18:50:35.689411 kernel: kauditd_printk_skb: 9 callbacks suppressed Oct 2 18:50:35.689605 kernel: audit: type=1106 audit(1696272635.685:977): pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.685000 audit[1992]: USER_END pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.686000 audit[1992]: CRED_DISP pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.706368 kernel: audit: type=1104 audit(1696272635.686:978): pid=1992 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.721097 sshd[1989]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:35.725000 audit[1989]: USER_END pid=1989 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:35.731643 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 18:50:35.732023 systemd[1]: session-7.scope: Consumed 9.678s CPU time. Oct 2 18:50:35.733991 systemd[1]: sshd@6-172.31.28.180:22-139.178.89.65:55546.service: Deactivated successfully. Oct 2 18:50:35.725000 audit[1989]: CRED_DISP pid=1989 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:35.747533 kernel: audit: type=1106 audit(1696272635.725:979): pid=1989 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:35.747685 kernel: audit: type=1104 audit(1696272635.725:980): pid=1989 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:35.747580 systemd-logind[1723]: Session 7 logged out. Waiting for processes to exit. Oct 2 18:50:35.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.180:22-139.178.89.65:55546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.757246 kernel: audit: type=1131 audit(1696272635.731:981): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.180:22-139.178.89.65:55546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:35.757940 systemd-logind[1723]: Removed session 7. Oct 2 18:50:42.160605 kubelet[2850]: I1002 18:50:42.160553 2850 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 18:50:42.161725 env[1731]: time="2023-10-02T18:50:42.161675352Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 18:50:42.162730 kubelet[2850]: I1002 18:50:42.162684 2850 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 18:50:42.230284 kubelet[2850]: I1002 18:50:42.230219 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:42.241301 systemd[1]: Created slice kubepods-besteffort-pod036c7cbb_8322_4f83_a5ca_ee8fddacfe8a.slice. Oct 2 18:50:42.250173 kubelet[2850]: W1002 18:50:42.250110 2850 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:50:42.250467 kubelet[2850]: E1002 18:50:42.250443 2850 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:50:42.252349 kubelet[2850]: W1002 18:50:42.252297 2850 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:50:42.252349 kubelet[2850]: E1002 18:50:42.252352 2850 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:50:42.253485 kubelet[2850]: I1002 18:50:42.253432 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-xtables-lock\") pod \"kube-proxy-9t52j\" (UID: \"036c7cbb-8322-4f83-a5ca-ee8fddacfe8a\") " pod="kube-system/kube-proxy-9t52j" Oct 2 18:50:42.253684 kubelet[2850]: I1002 18:50:42.253542 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-lib-modules\") pod \"kube-proxy-9t52j\" (UID: \"036c7cbb-8322-4f83-a5ca-ee8fddacfe8a\") " pod="kube-system/kube-proxy-9t52j" Oct 2 18:50:42.253684 kubelet[2850]: I1002 18:50:42.253609 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqcvm\" (UniqueName: \"kubernetes.io/projected/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-kube-api-access-vqcvm\") pod \"kube-proxy-9t52j\" (UID: \"036c7cbb-8322-4f83-a5ca-ee8fddacfe8a\") " pod="kube-system/kube-proxy-9t52j" Oct 2 18:50:42.253684 kubelet[2850]: I1002 18:50:42.253662 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-kube-proxy\") pod \"kube-proxy-9t52j\" (UID: \"036c7cbb-8322-4f83-a5ca-ee8fddacfe8a\") " pod="kube-system/kube-proxy-9t52j" Oct 2 18:50:42.418308 kubelet[2850]: I1002 18:50:42.418165 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:42.429012 systemd[1]: Created slice kubepods-besteffort-pod09d7502d_796a_469d_a42d_4f0c640d67fb.slice. Oct 2 18:50:42.455716 kubelet[2850]: I1002 18:50:42.455652 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/09d7502d-796a-469d-a42d-4f0c640d67fb-var-lib-calico\") pod \"tigera-operator-59c686f986-kzvrw\" (UID: \"09d7502d-796a-469d-a42d-4f0c640d67fb\") " pod="tigera-operator/tigera-operator-59c686f986-kzvrw" Oct 2 18:50:42.456111 kubelet[2850]: I1002 18:50:42.456087 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8stkc\" (UniqueName: \"kubernetes.io/projected/09d7502d-796a-469d-a42d-4f0c640d67fb-kube-api-access-8stkc\") pod \"tigera-operator-59c686f986-kzvrw\" (UID: \"09d7502d-796a-469d-a42d-4f0c640d67fb\") " pod="tigera-operator/tigera-operator-59c686f986-kzvrw" Oct 2 18:50:42.738965 env[1731]: time="2023-10-02T18:50:42.738838498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-kzvrw,Uid:09d7502d-796a-469d-a42d-4f0c640d67fb,Namespace:tigera-operator,Attempt:0,}" Oct 2 18:50:42.782947 env[1731]: time="2023-10-02T18:50:42.782758858Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:42.782947 env[1731]: time="2023-10-02T18:50:42.782825151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:42.783255 env[1731]: time="2023-10-02T18:50:42.782910332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:42.784016 env[1731]: time="2023-10-02T18:50:42.783822714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9f85bbd7655f82a7a023653b223e24e39e29aeacdb86cfc55d31e4a70b0b24a pid=2935 runtime=io.containerd.runc.v2 Oct 2 18:50:42.818663 systemd[1]: Started cri-containerd-a9f85bbd7655f82a7a023653b223e24e39e29aeacdb86cfc55d31e4a70b0b24a.scope. Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.889319 kernel: audit: type=1400 audit(1696272642.871:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.889466 kernel: audit: type=1400 audit(1696272642.871:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.897737 kernel: audit: type=1400 audit(1696272642.871:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.905925 kernel: audit: type=1400 audit(1696272642.871:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.914704 kernel: audit: type=1400 audit(1696272642.871:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.931962 kernel: audit: type=1400 audit(1696272642.871:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.932085 kernel: audit: type=1400 audit(1696272642.871:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.948881 kernel: audit: type=1400 audit(1696272642.871:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.972331 kernel: audit: type=1400 audit(1696272642.871:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.972445 kernel: audit: type=1400 audit(1696272642.880:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.880000 audit: BPF prog-id=112 op=LOAD Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2935 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:42.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663835626264373635356638326137613032333635336232323365 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2935 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:42.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663835626264373635356638326137613032333635336232323365 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.888000 audit: BPF prog-id=113 op=LOAD Oct 2 18:50:42.888000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2935 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:42.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663835626264373635356638326137613032333635336232323365 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.895000 audit: BPF prog-id=114 op=LOAD Oct 2 18:50:42.895000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2935 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:42.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663835626264373635356638326137613032333635336232323365 Oct 2 18:50:42.896000 audit: BPF prog-id=114 op=UNLOAD Oct 2 18:50:42.896000 audit: BPF prog-id=113 op=UNLOAD Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:42.896000 audit: BPF prog-id=115 op=LOAD Oct 2 18:50:42.896000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2935 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:42.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663835626264373635356638326137613032333635336232323365 Oct 2 18:50:42.989336 env[1731]: time="2023-10-02T18:50:42.989170443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-kzvrw,Uid:09d7502d-796a-469d-a42d-4f0c640d67fb,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a9f85bbd7655f82a7a023653b223e24e39e29aeacdb86cfc55d31e4a70b0b24a\"" Oct 2 18:50:42.994268 env[1731]: time="2023-10-02T18:50:42.993429082Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 18:50:43.355778 kubelet[2850]: E1002 18:50:43.355348 2850 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:50:43.356352 kubelet[2850]: E1002 18:50:43.356039 2850 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-kube-proxy podName:036c7cbb-8322-4f83-a5ca-ee8fddacfe8a nodeName:}" failed. No retries permitted until 2023-10-02 18:50:43.85600217 +0000 UTC m=+15.042038719 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/036c7cbb-8322-4f83-a5ca-ee8fddacfe8a-kube-proxy") pod "kube-proxy-9t52j" (UID: "036c7cbb-8322-4f83-a5ca-ee8fddacfe8a") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:50:44.054099 env[1731]: time="2023-10-02T18:50:44.054016171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9t52j,Uid:036c7cbb-8322-4f83-a5ca-ee8fddacfe8a,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:44.099550 env[1731]: time="2023-10-02T18:50:44.099063295Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:44.099550 env[1731]: time="2023-10-02T18:50:44.099135816Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:44.099550 env[1731]: time="2023-10-02T18:50:44.099160873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:44.099932 env[1731]: time="2023-10-02T18:50:44.099663559Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42542a673ca065163c25e92a149797d8e56c36c763467b8bc4b84021df0a8bd5 pid=2977 runtime=io.containerd.runc.v2 Oct 2 18:50:44.137572 systemd[1]: Started cri-containerd-42542a673ca065163c25e92a149797d8e56c36c763467b8bc4b84021df0a8bd5.scope. Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.191000 audit: BPF prog-id=116 op=LOAD Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2977 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432353432613637336361303635313633633235653932613134393739 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2977 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432353432613637336361303635313633633235653932613134393739 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit: BPF prog-id=117 op=LOAD Oct 2 18:50:44.192000 audit[2987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2977 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432353432613637336361303635313633633235653932613134393739 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.192000 audit: BPF prog-id=118 op=LOAD Oct 2 18:50:44.192000 audit[2987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2977 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432353432613637336361303635313633633235653932613134393739 Oct 2 18:50:44.193000 audit: BPF prog-id=118 op=UNLOAD Oct 2 18:50:44.193000 audit: BPF prog-id=117 op=UNLOAD Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { perfmon } for pid=2987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit[2987]: AVC avc: denied { bpf } for pid=2987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.193000 audit: BPF prog-id=119 op=LOAD Oct 2 18:50:44.193000 audit[2987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2977 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432353432613637336361303635313633633235653932613134393739 Oct 2 18:50:44.235242 env[1731]: time="2023-10-02T18:50:44.235187214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9t52j,Uid:036c7cbb-8322-4f83-a5ca-ee8fddacfe8a,Namespace:kube-system,Attempt:0,} returns sandbox id \"42542a673ca065163c25e92a149797d8e56c36c763467b8bc4b84021df0a8bd5\"" Oct 2 18:50:44.243777 env[1731]: time="2023-10-02T18:50:44.243700438Z" level=info msg="CreateContainer within sandbox \"42542a673ca065163c25e92a149797d8e56c36c763467b8bc4b84021df0a8bd5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 18:50:44.274272 env[1731]: time="2023-10-02T18:50:44.274181501Z" level=info msg="CreateContainer within sandbox \"42542a673ca065163c25e92a149797d8e56c36c763467b8bc4b84021df0a8bd5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b60f110902ad24f0b5a868900793bff4bdd72cf9e2b660afdd5cdd082cb9f712\"" Oct 2 18:50:44.278610 env[1731]: time="2023-10-02T18:50:44.278338585Z" level=info msg="StartContainer for \"b60f110902ad24f0b5a868900793bff4bdd72cf9e2b660afdd5cdd082cb9f712\"" Oct 2 18:50:44.348103 systemd[1]: Started cri-containerd-b60f110902ad24f0b5a868900793bff4bdd72cf9e2b660afdd5cdd082cb9f712.scope. Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2977 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236306631313039303261643234663062356138363839303037393362 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.412000 audit: BPF prog-id=120 op=LOAD Oct 2 18:50:44.412000 audit[3017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2977 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236306631313039303261643234663062356138363839303037393362 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit: BPF prog-id=121 op=LOAD Oct 2 18:50:44.413000 audit[3017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2977 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236306631313039303261643234663062356138363839303037393362 Oct 2 18:50:44.413000 audit: BPF prog-id=121 op=UNLOAD Oct 2 18:50:44.413000 audit: BPF prog-id=120 op=UNLOAD Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:44.413000 audit: BPF prog-id=122 op=LOAD Oct 2 18:50:44.413000 audit[3017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2977 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236306631313039303261643234663062356138363839303037393362 Oct 2 18:50:44.484402 env[1731]: time="2023-10-02T18:50:44.484041228Z" level=info msg="StartContainer for \"b60f110902ad24f0b5a868900793bff4bdd72cf9e2b660afdd5cdd082cb9f712\" returns successfully" Oct 2 18:50:44.751000 audit[3068]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.751000 audit[3068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe45cd840 a2=0 a3=ffffb1ee36c0 items=0 ppid=3028 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:50:44.753000 audit[3069]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:44.753000 audit[3069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5b944c0 a2=0 a3=ffff9718b6c0 items=0 ppid=3028 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:50:44.757000 audit[3070]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.757000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc85fe10 a2=0 a3=ffff843366c0 items=0 ppid=3028 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:50:44.759000 audit[3071]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:44.759000 audit[3071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe28d9c50 a2=0 a3=ffffa15cf6c0 items=0 ppid=3028 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:50:44.765000 audit[3073]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.765000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5a803d0 a2=0 a3=ffff819d76c0 items=0 ppid=3028 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:50:44.768000 audit[3074]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:44.768000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9228c50 a2=0 a3=ffff9c4356c0 items=0 ppid=3028 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:50:44.845000 audit[3075]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.845000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffef3c00d0 a2=0 a3=ffffae9586c0 items=0 ppid=3028 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:50:44.854000 audit[3077]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.854000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff77fd360 a2=0 a3=ffff918736c0 items=0 ppid=3028 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 18:50:44.869000 audit[3080]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.869000 audit[3080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe1c4f110 a2=0 a3=ffff9ff616c0 items=0 ppid=3028 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 18:50:44.874000 audit[3081]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.874000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc50c1f0 a2=0 a3=ffff844d06c0 items=0 ppid=3028 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:50:44.884000 audit[3083]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.884000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2f0b180 a2=0 a3=ffff9971d6c0 items=0 ppid=3028 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:50:44.888000 audit[3084]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.888000 audit[3084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6989d30 a2=0 a3=ffffb3caf6c0 items=0 ppid=3028 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:50:44.899000 audit[3086]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.899000 audit[3086]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffedffea60 a2=0 a3=ffff8a44b6c0 items=0 ppid=3028 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:50:44.914000 audit[3089]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.914000 audit[3089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda098220 a2=0 a3=ffff95ba16c0 items=0 ppid=3028 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 18:50:44.920000 audit[3090]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.920000 audit[3090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb668fe0 a2=0 a3=ffffba0506c0 items=0 ppid=3028 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:50:44.929000 audit[3092]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.929000 audit[3092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd5763a30 a2=0 a3=ffffbbcbb6c0 items=0 ppid=3028 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:50:44.934000 audit[3093]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.934000 audit[3093]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf6a2090 a2=0 a3=ffff9a3076c0 items=0 ppid=3028 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:50:44.950000 audit[3095]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.950000 audit[3095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc796ba60 a2=0 a3=ffffba0026c0 items=0 ppid=3028 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:44.964000 audit[3098]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.964000 audit[3098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd67f91a0 a2=0 a3=ffffa11d46c0 items=0 ppid=3028 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:44.979000 audit[3101]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.979000 audit[3101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7cd8bb0 a2=0 a3=ffff93eae6c0 items=0 ppid=3028 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:50:44.983000 audit[3102]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.983000 audit[3102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffedc4dd00 a2=0 a3=ffff9940e6c0 items=0 ppid=3028 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:50:44.993000 audit[3104]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:44.993000 audit[3104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc9ad2f90 a2=0 a3=ffff8f5c26c0 items=0 ppid=3028 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:44.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:45.008000 audit[3107]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:45.008000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcddee370 a2=0 a3=ffffaef636c0 items=0 ppid=3028 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:45.038000 audit[3112]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:45.038000 audit[3112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff653ef00 a2=0 a3=ffffbb0736c0 items=0 ppid=3028 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:50:45.048000 audit[3114]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:45.048000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffef033e50 a2=0 a3=ffffabe596c0 items=0 ppid=3028 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:50:45.072657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2393427640.mount: Deactivated successfully. Oct 2 18:50:45.098000 audit[3116]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:45.098000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd0890350 a2=0 a3=ffffafc886c0 items=0 ppid=3028 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:45.115000 audit[3116]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:45.115000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd0890350 a2=0 a3=ffffafc886c0 items=0 ppid=3028 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:45.121000 audit[3122]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.121000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff57e07a0 a2=0 a3=ffffba9a46c0 items=0 ppid=3028 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:50:45.130000 audit[3124]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.130000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe10780b0 a2=0 a3=ffffa0a5a6c0 items=0 ppid=3028 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 18:50:45.144000 audit[3127]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.144000 audit[3127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd3b5e370 a2=0 a3=ffff88e566c0 items=0 ppid=3028 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 18:50:45.149000 audit[3128]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.149000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3e1ab10 a2=0 a3=ffff9cd446c0 items=0 ppid=3028 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:50:45.160000 audit[3130]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.160000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5edc8e0 a2=0 a3=ffffb32036c0 items=0 ppid=3028 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:50:45.165000 audit[3131]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.165000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe28f1dc0 a2=0 a3=ffff90ac86c0 items=0 ppid=3028 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:50:45.175000 audit[3133]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.175000 audit[3133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcdf96e10 a2=0 a3=ffff823ee6c0 items=0 ppid=3028 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 18:50:45.192000 audit[3136]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.192000 audit[3136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcced8330 a2=0 a3=ffff9da886c0 items=0 ppid=3028 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:50:45.196000 audit[3137]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.196000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5d40d80 a2=0 a3=ffff9e1516c0 items=0 ppid=3028 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:50:45.206000 audit[3139]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.206000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4d5d3b0 a2=0 a3=ffff9797e6c0 items=0 ppid=3028 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:50:45.211000 audit[3140]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.211000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd691e100 a2=0 a3=ffff9957d6c0 items=0 ppid=3028 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:50:45.223000 audit[3142]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.223000 audit[3142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbf6cdc0 a2=0 a3=ffff878ad6c0 items=0 ppid=3028 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:45.242000 audit[3145]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.242000 audit[3145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc343e30 a2=0 a3=ffffbc3da6c0 items=0 ppid=3028 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:50:45.255000 audit[3148]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.255000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdafc5ed0 a2=0 a3=ffff87a446c0 items=0 ppid=3028 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 18:50:45.261000 audit[3149]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.261000 audit[3149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd30df5f0 a2=0 a3=ffffabeb56c0 items=0 ppid=3028 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:50:45.277000 audit[3151]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.277000 audit[3151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc8a2c3c0 a2=0 a3=ffffb28346c0 items=0 ppid=3028 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:45.294000 audit[3154]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.294000 audit[3154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff514b840 a2=0 a3=ffff99ecb6c0 items=0 ppid=3028 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:45.299000 audit[3155]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=3155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.299000 audit[3155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4f3e180 a2=0 a3=ffffaf6b46c0 items=0 ppid=3028 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:50:45.310000 audit[3157]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.310000 audit[3157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeb823bf0 a2=0 a3=ffffaf12a6c0 items=0 ppid=3028 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:45.326000 audit[3160]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.326000 audit[3160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcde86420 a2=0 a3=ffffbae706c0 items=0 ppid=3028 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:45.334000 audit[3161]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.334000 audit[3161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb39fd00 a2=0 a3=ffff909666c0 items=0 ppid=3028 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:50:45.354000 audit[3163]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:45.354000 audit[3163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff2b28180 a2=0 a3=ffff8ad976c0 items=0 ppid=3028 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:50:45.365000 audit[3165]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:50:45.365000 audit[3165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffed663130 a2=0 a3=ffffb635a6c0 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.365000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:45.366000 audit[3165]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:50:45.366000 audit[3165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffed663130 a2=0 a3=ffffb635a6c0 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.366000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:45.395599 kubelet[2850]: I1002 18:50:45.395537 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9t52j" podStartSLOduration=3.395457052 podCreationTimestamp="2023-10-02 18:50:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:45.391522732 +0000 UTC m=+16.577559305" watchObservedRunningTime="2023-10-02 18:50:45.395457052 +0000 UTC m=+16.581493601" Oct 2 18:50:45.675470 env[1731]: time="2023-10-02T18:50:45.673431642Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:45.678255 env[1731]: time="2023-10-02T18:50:45.678185633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:45.683869 env[1731]: time="2023-10-02T18:50:45.683791686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:45.688302 env[1731]: time="2023-10-02T18:50:45.688240343Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:45.689938 env[1731]: time="2023-10-02T18:50:45.689870781Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 18:50:45.698569 env[1731]: time="2023-10-02T18:50:45.698481820Z" level=info msg="CreateContainer within sandbox \"a9f85bbd7655f82a7a023653b223e24e39e29aeacdb86cfc55d31e4a70b0b24a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 18:50:45.716928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283853740.mount: Deactivated successfully. Oct 2 18:50:45.729165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3375371313.mount: Deactivated successfully. Oct 2 18:50:45.732063 env[1731]: time="2023-10-02T18:50:45.731985226Z" level=info msg="CreateContainer within sandbox \"a9f85bbd7655f82a7a023653b223e24e39e29aeacdb86cfc55d31e4a70b0b24a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb\"" Oct 2 18:50:45.735357 env[1731]: time="2023-10-02T18:50:45.734357403Z" level=info msg="StartContainer for \"1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb\"" Oct 2 18:50:45.777719 systemd[1]: Started cri-containerd-1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb.scope. Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.826000 audit: BPF prog-id=123 op=LOAD Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2935 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393966633230306536613331643866303535303863346535383664 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2935 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393966633230306536613331643866303535303863346535383664 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.827000 audit: BPF prog-id=124 op=LOAD Oct 2 18:50:45.827000 audit[3174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2935 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393966633230306536613331643866303535303863346535383664 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit: BPF prog-id=125 op=LOAD Oct 2 18:50:45.828000 audit[3174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2935 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393966633230306536613331643866303535303863346535383664 Oct 2 18:50:45.828000 audit: BPF prog-id=125 op=UNLOAD Oct 2 18:50:45.828000 audit: BPF prog-id=124 op=UNLOAD Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:45.828000 audit: BPF prog-id=126 op=LOAD Oct 2 18:50:45.828000 audit[3174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2935 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:45.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393966633230306536613331643866303535303863346535383664 Oct 2 18:50:45.863593 env[1731]: time="2023-10-02T18:50:45.863530933Z" level=info msg="StartContainer for \"1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb\" returns successfully" Oct 2 18:50:49.199000 audit[3203]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.202806 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 2 18:50:49.202945 kernel: audit: type=1325 audit(1696272649.199:1093): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.199000 audit[3203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff09d0d80 a2=0 a3=ffff883416c0 items=0 ppid=3028 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.227751 kernel: audit: type=1300 audit(1696272649.199:1093): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff09d0d80 a2=0 a3=ffff883416c0 items=0 ppid=3028 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.227911 kernel: audit: type=1327 audit(1696272649.199:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.208000 audit[3203]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.208000 audit[3203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff09d0d80 a2=0 a3=ffff883416c0 items=0 ppid=3028 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.247165 kernel: audit: type=1325 audit(1696272649.208:1094): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.247327 kernel: audit: type=1300 audit(1696272649.208:1094): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff09d0d80 a2=0 a3=ffff883416c0 items=0 ppid=3028 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.247400 kernel: audit: type=1327 audit(1696272649.208:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.252000 audit[3205]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.259687 kernel: audit: type=1325 audit(1696272649.252:1095): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.252000 audit[3205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffca3c3a50 a2=0 a3=ffffad4f26c0 items=0 ppid=3028 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.274307 kernel: audit: type=1300 audit(1696272649.252:1095): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffca3c3a50 a2=0 a3=ffffad4f26c0 items=0 ppid=3028 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.274449 kernel: audit: type=1327 audit(1696272649.252:1095): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.254000 audit[3205]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.285914 kernel: audit: type=1325 audit(1696272649.254:1096): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:49.254000 audit[3205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffca3c3a50 a2=0 a3=ffffad4f26c0 items=0 ppid=3028 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:49.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.435513 kubelet[2850]: I1002 18:50:49.435445 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-kzvrw" podStartSLOduration=4.7367033 podCreationTimestamp="2023-10-02 18:50:42 +0000 UTC" firstStartedPulling="2023-10-02 18:50:42.991921558 +0000 UTC m=+14.177958107" lastFinishedPulling="2023-10-02 18:50:45.690601276 +0000 UTC m=+16.876637837" observedRunningTime="2023-10-02 18:50:46.365915172 +0000 UTC m=+17.551951745" watchObservedRunningTime="2023-10-02 18:50:49.43538303 +0000 UTC m=+20.621419615" Oct 2 18:50:49.436283 kubelet[2850]: I1002 18:50:49.435619 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:49.446421 systemd[1]: Created slice kubepods-besteffort-podfe49e3ab_9ea3_4bdc_826a_d45ef741d0dc.slice. Oct 2 18:50:49.520070 kubelet[2850]: I1002 18:50:49.519902 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc-typha-certs\") pod \"calico-typha-6cf5cd5dc7-m5shb\" (UID: \"fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc\") " pod="calico-system/calico-typha-6cf5cd5dc7-m5shb" Oct 2 18:50:49.520070 kubelet[2850]: I1002 18:50:49.520036 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc-tigera-ca-bundle\") pod \"calico-typha-6cf5cd5dc7-m5shb\" (UID: \"fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc\") " pod="calico-system/calico-typha-6cf5cd5dc7-m5shb" Oct 2 18:50:49.520324 kubelet[2850]: I1002 18:50:49.520124 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nl867\" (UniqueName: \"kubernetes.io/projected/fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc-kube-api-access-nl867\") pod \"calico-typha-6cf5cd5dc7-m5shb\" (UID: \"fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc\") " pod="calico-system/calico-typha-6cf5cd5dc7-m5shb" Oct 2 18:50:49.619760 kubelet[2850]: I1002 18:50:49.619715 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:50:49.647169 systemd[1]: Created slice kubepods-besteffort-pod578dbf33_9bd8_40fb_b183_b60310632965.slice. Oct 2 18:50:49.720709 kubelet[2850]: I1002 18:50:49.720645 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/578dbf33-9bd8-40fb-b183-b60310632965-tigera-ca-bundle\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721018 kubelet[2850]: I1002 18:50:49.720725 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-var-run-calico\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721018 kubelet[2850]: I1002 18:50:49.720780 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/578dbf33-9bd8-40fb-b183-b60310632965-node-certs\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721018 kubelet[2850]: I1002 18:50:49.720825 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-cni-net-dir\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721018 kubelet[2850]: I1002 18:50:49.720903 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-policysync\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721018 kubelet[2850]: I1002 18:50:49.720962 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-cni-bin-dir\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721343 kubelet[2850]: I1002 18:50:49.721009 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7c66k\" (UniqueName: \"kubernetes.io/projected/578dbf33-9bd8-40fb-b183-b60310632965-kube-api-access-7c66k\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721343 kubelet[2850]: I1002 18:50:49.721054 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-lib-modules\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721343 kubelet[2850]: I1002 18:50:49.721098 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-cni-log-dir\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721343 kubelet[2850]: I1002 18:50:49.721140 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-flexvol-driver-host\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721343 kubelet[2850]: I1002 18:50:49.721185 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-xtables-lock\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.721656 kubelet[2850]: I1002 18:50:49.721227 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/578dbf33-9bd8-40fb-b183-b60310632965-var-lib-calico\") pod \"calico-node-tszhs\" (UID: \"578dbf33-9bd8-40fb-b183-b60310632965\") " pod="calico-system/calico-node-tszhs" Oct 2 18:50:49.752271 env[1731]: time="2023-10-02T18:50:49.751913504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6cf5cd5dc7-m5shb,Uid:fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc,Namespace:calico-system,Attempt:0,}" Oct 2 18:50:49.814213 env[1731]: time="2023-10-02T18:50:49.813986866Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:49.814391 env[1731]: time="2023-10-02T18:50:49.814075167Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:49.814391 env[1731]: time="2023-10-02T18:50:49.814103320Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:49.817037 env[1731]: time="2023-10-02T18:50:49.816923514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e463275b5d34d5a7122a629462d47c5222f5747a028c7e0e06486d5d7a9620c7 pid=3216 runtime=io.containerd.runc.v2 Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.835335 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.839351 kubelet[2850]: W1002 18:50:49.835376 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.835418 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.836409 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.839351 kubelet[2850]: W1002 18:50:49.836438 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.836713 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.837319 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.839351 kubelet[2850]: W1002 18:50:49.837341 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.837373 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.839351 kubelet[2850]: E1002 18:50:49.837764 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.840096 kubelet[2850]: W1002 18:50:49.837789 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.840096 kubelet[2850]: E1002 18:50:49.837820 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.872171 kubelet[2850]: E1002 18:50:49.872117 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.872171 kubelet[2850]: W1002 18:50:49.872157 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.872422 kubelet[2850]: E1002 18:50:49.872196 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.910190 systemd[1]: Started cri-containerd-e463275b5d34d5a7122a629462d47c5222f5747a028c7e0e06486d5d7a9620c7.scope. Oct 2 18:50:49.917048 kubelet[2850]: E1002 18:50:49.916982 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:49.917048 kubelet[2850]: W1002 18:50:49.917025 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:49.917328 kubelet[2850]: E1002 18:50:49.917065 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:49.955693 env[1731]: time="2023-10-02T18:50:49.955617750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tszhs,Uid:578dbf33-9bd8-40fb-b183-b60310632965,Namespace:calico-system,Attempt:0,}" Oct 2 18:50:50.007574 env[1731]: time="2023-10-02T18:50:50.007431461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:50.008144 env[1731]: time="2023-10-02T18:50:50.008054857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:50.008508 env[1731]: time="2023-10-02T18:50:50.008403486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:50.011907 env[1731]: time="2023-10-02T18:50:50.009323801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06 pid=3259 runtime=io.containerd.runc.v2 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.043000 audit: BPF prog-id=127 op=LOAD Oct 2 18:50:50.045000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.045000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3216 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363332373562356433346435613731323261363239343632643437 Oct 2 18:50:50.046000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.046000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3216 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363332373562356433346435613731323261363239343632643437 Oct 2 18:50:50.048252 systemd[1]: Started cri-containerd-45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06.scope. Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.049000 audit: BPF prog-id=128 op=LOAD Oct 2 18:50:50.049000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3216 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363332373562356433346435613731323261363239343632643437 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.055000 audit: BPF prog-id=129 op=LOAD Oct 2 18:50:50.055000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3216 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363332373562356433346435613731323261363239343632643437 Oct 2 18:50:50.057000 audit: BPF prog-id=129 op=UNLOAD Oct 2 18:50:50.057000 audit: BPF prog-id=128 op=UNLOAD Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.057000 audit: BPF prog-id=130 op=LOAD Oct 2 18:50:50.057000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3216 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363332373562356433346435613731323261363239343632643437 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.145000 audit: BPF prog-id=131 op=LOAD Oct 2 18:50:50.152000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.152000 audit[3270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3259 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616136623335666636616639346233336533316139376664626531 Oct 2 18:50:50.152000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.152000 audit[3270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3259 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616136623335666636616639346233336533316139376664626531 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.153000 audit: BPF prog-id=132 op=LOAD Oct 2 18:50:50.153000 audit[3270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3259 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616136623335666636616639346233336533316139376664626531 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.155000 audit: BPF prog-id=133 op=LOAD Oct 2 18:50:50.155000 audit[3270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3259 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616136623335666636616639346233336533316139376664626531 Oct 2 18:50:50.156000 audit: BPF prog-id=133 op=UNLOAD Oct 2 18:50:50.156000 audit: BPF prog-id=132 op=UNLOAD Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.157000 audit: BPF prog-id=134 op=LOAD Oct 2 18:50:50.157000 audit[3270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3259 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435616136623335666636616639346233336533316139376664626531 Oct 2 18:50:50.180225 env[1731]: time="2023-10-02T18:50:50.180113601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6cf5cd5dc7-m5shb,Uid:fe49e3ab-9ea3-4bdc-826a-d45ef741d0dc,Namespace:calico-system,Attempt:0,} returns sandbox id \"e463275b5d34d5a7122a629462d47c5222f5747a028c7e0e06486d5d7a9620c7\"" Oct 2 18:50:50.185290 env[1731]: time="2023-10-02T18:50:50.185189437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 18:50:50.206077 env[1731]: time="2023-10-02T18:50:50.205994920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tszhs,Uid:578dbf33-9bd8-40fb-b183-b60310632965,Namespace:calico-system,Attempt:0,} returns sandbox id \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\"" Oct 2 18:50:50.299000 audit[3300]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:50.299000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe9fd9b10 a2=0 a3=ffff9c0dc6c0 items=0 ppid=3028 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:50.300000 audit[3300]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:50.300000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe9fd9b10 a2=0 a3=ffff9c0dc6c0 items=0 ppid=3028 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:51.698478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount810368407.mount: Deactivated successfully. Oct 2 18:50:52.980105 env[1731]: time="2023-10-02T18:50:52.980022827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:52.982929 env[1731]: time="2023-10-02T18:50:52.982838342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:52.987244 env[1731]: time="2023-10-02T18:50:52.985817749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:52.990026 env[1731]: time="2023-10-02T18:50:52.989952799Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:52.990569 env[1731]: time="2023-10-02T18:50:52.990494481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 18:50:52.994645 env[1731]: time="2023-10-02T18:50:52.994540739Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 18:50:53.003237 env[1731]: time="2023-10-02T18:50:53.002261092Z" level=info msg="CreateContainer within sandbox \"e463275b5d34d5a7122a629462d47c5222f5747a028c7e0e06486d5d7a9620c7\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 18:50:53.032714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2474834236.mount: Deactivated successfully. Oct 2 18:50:53.044216 env[1731]: time="2023-10-02T18:50:53.044151815Z" level=info msg="CreateContainer within sandbox \"e463275b5d34d5a7122a629462d47c5222f5747a028c7e0e06486d5d7a9620c7\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"97ae87f2dc4647ca7fc2dbd8db841c3ccf2b1ca705fb40947cd1b0ea6c1cd38f\"" Oct 2 18:50:53.045576 env[1731]: time="2023-10-02T18:50:53.045523239Z" level=info msg="StartContainer for \"97ae87f2dc4647ca7fc2dbd8db841c3ccf2b1ca705fb40947cd1b0ea6c1cd38f\"" Oct 2 18:50:53.105089 systemd[1]: Started cri-containerd-97ae87f2dc4647ca7fc2dbd8db841c3ccf2b1ca705fb40947cd1b0ea6c1cd38f.scope. Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.163000 audit: BPF prog-id=135 op=LOAD Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3216 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:53.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616538376632646334363437636137666332646264386462383431 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3216 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:53.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616538376632646334363437636137666332646264386462383431 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.164000 audit: BPF prog-id=136 op=LOAD Oct 2 18:50:53.164000 audit[3308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3216 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:53.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616538376632646334363437636137666332646264386462383431 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.166000 audit: BPF prog-id=137 op=LOAD Oct 2 18:50:53.166000 audit[3308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3216 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:53.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616538376632646334363437636137666332646264386462383431 Oct 2 18:50:53.167000 audit: BPF prog-id=137 op=UNLOAD Oct 2 18:50:53.167000 audit: BPF prog-id=136 op=UNLOAD Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:53.168000 audit: BPF prog-id=138 op=LOAD Oct 2 18:50:53.168000 audit[3308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3216 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616538376632646334363437636137666332646264386462383431 Oct 2 18:50:53.208215 env[1731]: time="2023-10-02T18:50:53.208150348Z" level=info msg="StartContainer for \"97ae87f2dc4647ca7fc2dbd8db841c3ccf2b1ca705fb40947cd1b0ea6c1cd38f\" returns successfully" Oct 2 18:50:53.429818 kubelet[2850]: E1002 18:50:53.429653 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.429818 kubelet[2850]: W1002 18:50:53.429714 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.429818 kubelet[2850]: E1002 18:50:53.429783 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.432705 kubelet[2850]: E1002 18:50:53.432632 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.432705 kubelet[2850]: W1002 18:50:53.432695 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.432945 kubelet[2850]: E1002 18:50:53.432754 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.433333 kubelet[2850]: E1002 18:50:53.433284 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.433333 kubelet[2850]: W1002 18:50:53.433318 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.433503 kubelet[2850]: E1002 18:50:53.433352 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.433917 kubelet[2850]: E1002 18:50:53.433860 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.433917 kubelet[2850]: W1002 18:50:53.433907 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.434073 kubelet[2850]: E1002 18:50:53.433942 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.434332 kubelet[2850]: E1002 18:50:53.434294 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.434332 kubelet[2850]: W1002 18:50:53.434324 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.434474 kubelet[2850]: E1002 18:50:53.434351 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.435043 kubelet[2850]: E1002 18:50:53.434996 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.435043 kubelet[2850]: W1002 18:50:53.435031 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.435216 kubelet[2850]: E1002 18:50:53.435067 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.441411 kubelet[2850]: E1002 18:50:53.441322 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.441411 kubelet[2850]: W1002 18:50:53.441399 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.441624 kubelet[2850]: E1002 18:50:53.441469 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.444528 kubelet[2850]: E1002 18:50:53.444269 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.444528 kubelet[2850]: W1002 18:50:53.444296 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.444528 kubelet[2850]: E1002 18:50:53.444330 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.445183 kubelet[2850]: E1002 18:50:53.444937 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.445183 kubelet[2850]: W1002 18:50:53.444963 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.445183 kubelet[2850]: E1002 18:50:53.444994 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.446016 kubelet[2850]: E1002 18:50:53.445536 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.446016 kubelet[2850]: W1002 18:50:53.445559 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.446016 kubelet[2850]: E1002 18:50:53.445588 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.446671 kubelet[2850]: E1002 18:50:53.446381 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.446671 kubelet[2850]: W1002 18:50:53.446411 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.446671 kubelet[2850]: E1002 18:50:53.446445 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.447436 kubelet[2850]: E1002 18:50:53.447118 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.447436 kubelet[2850]: W1002 18:50:53.447142 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.447436 kubelet[2850]: E1002 18:50:53.447174 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.450989 kubelet[2850]: E1002 18:50:53.450617 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.450989 kubelet[2850]: W1002 18:50:53.450650 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.450989 kubelet[2850]: E1002 18:50:53.450685 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.451803 kubelet[2850]: E1002 18:50:53.451451 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.451803 kubelet[2850]: W1002 18:50:53.451496 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.451803 kubelet[2850]: E1002 18:50:53.451538 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.453315 kubelet[2850]: E1002 18:50:53.453011 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.453315 kubelet[2850]: W1002 18:50:53.453040 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.453315 kubelet[2850]: E1002 18:50:53.453082 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.453839 kubelet[2850]: E1002 18:50:53.453614 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.453839 kubelet[2850]: W1002 18:50:53.453636 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.453839 kubelet[2850]: E1002 18:50:53.453785 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.454484 kubelet[2850]: E1002 18:50:53.454249 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.454484 kubelet[2850]: W1002 18:50:53.454276 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.454484 kubelet[2850]: E1002 18:50:53.454439 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.454787 kubelet[2850]: E1002 18:50:53.454757 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.455067 kubelet[2850]: W1002 18:50:53.454922 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.455221 kubelet[2850]: E1002 18:50:53.455197 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.455438 kubelet[2850]: E1002 18:50:53.455419 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.455566 kubelet[2850]: W1002 18:50:53.455542 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.455809 kubelet[2850]: E1002 18:50:53.455789 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.456035 kubelet[2850]: E1002 18:50:53.456016 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.456150 kubelet[2850]: W1002 18:50:53.456127 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.456344 kubelet[2850]: E1002 18:50:53.456325 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.459104 kubelet[2850]: E1002 18:50:53.459067 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.459482 kubelet[2850]: W1002 18:50:53.459449 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.459654 kubelet[2850]: E1002 18:50:53.459632 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.462103 kubelet[2850]: E1002 18:50:53.462045 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.462103 kubelet[2850]: W1002 18:50:53.462087 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.462365 kubelet[2850]: E1002 18:50:53.462143 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.462600 kubelet[2850]: E1002 18:50:53.462560 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.462600 kubelet[2850]: W1002 18:50:53.462592 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.462753 kubelet[2850]: E1002 18:50:53.462622 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.463354 kubelet[2850]: E1002 18:50:53.463321 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.463533 kubelet[2850]: W1002 18:50:53.463507 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.463673 kubelet[2850]: E1002 18:50:53.463652 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.464297 kubelet[2850]: E1002 18:50:53.464267 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.464501 kubelet[2850]: W1002 18:50:53.464470 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.464648 kubelet[2850]: E1002 18:50:53.464624 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.465263 kubelet[2850]: E1002 18:50:53.465234 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.465450 kubelet[2850]: W1002 18:50:53.465421 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.465577 kubelet[2850]: E1002 18:50:53.465555 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.468942 kubelet[2850]: E1002 18:50:53.468820 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.469294 kubelet[2850]: W1002 18:50:53.469259 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.469767 kubelet[2850]: E1002 18:50:53.469736 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.470259 kubelet[2850]: E1002 18:50:53.470233 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.470416 kubelet[2850]: W1002 18:50:53.470387 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.470688 kubelet[2850]: E1002 18:50:53.470664 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.471169 kubelet[2850]: E1002 18:50:53.471141 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.471375 kubelet[2850]: W1002 18:50:53.471334 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.471518 kubelet[2850]: E1002 18:50:53.471495 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:53.472466 kubelet[2850]: E1002 18:50:53.472436 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:53.472635 kubelet[2850]: W1002 18:50:53.472608 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:53.472789 kubelet[2850]: E1002 18:50:53.472767 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.025437 systemd[1]: run-containerd-runc-k8s.io-97ae87f2dc4647ca7fc2dbd8db841c3ccf2b1ca705fb40947cd1b0ea6c1cd38f-runc.lSuELL.mount: Deactivated successfully. Oct 2 18:50:54.406696 kubelet[2850]: I1002 18:50:54.406533 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6cf5cd5dc7-m5shb" podStartSLOduration=2.597808202 podCreationTimestamp="2023-10-02 18:50:49 +0000 UTC" firstStartedPulling="2023-10-02 18:50:50.18361521 +0000 UTC m=+21.369651771" lastFinishedPulling="2023-10-02 18:50:52.992287907 +0000 UTC m=+24.178324480" observedRunningTime="2023-10-02 18:50:53.402551178 +0000 UTC m=+24.588587739" watchObservedRunningTime="2023-10-02 18:50:54.406480911 +0000 UTC m=+25.592517460" Oct 2 18:50:54.456269 kubelet[2850]: E1002 18:50:54.455729 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.456269 kubelet[2850]: W1002 18:50:54.455761 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.456269 kubelet[2850]: E1002 18:50:54.455935 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.457000 audit[3372]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.460925 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 18:50:54.461024 kernel: audit: type=1325 audit(1696272654.457:1153): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.457000 audit[3372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe55d10b0 a2=0 a3=ffffa42a26c0 items=0 ppid=3028 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.467755 kubelet[2850]: E1002 18:50:54.467243 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.467755 kubelet[2850]: W1002 18:50:54.467317 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.467755 kubelet[2850]: E1002 18:50:54.467360 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.479372 kernel: audit: type=1300 audit(1696272654.457:1153): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe55d10b0 a2=0 a3=ffffa42a26c0 items=0 ppid=3028 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.479718 kernel: audit: type=1327 audit(1696272654.457:1153): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.480232 kubelet[2850]: E1002 18:50:54.479601 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.480232 kubelet[2850]: W1002 18:50:54.479628 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.480731 kubelet[2850]: E1002 18:50:54.480434 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.465000 audit[3372]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.487013 kubelet[2850]: E1002 18:50:54.486801 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.487286 kubelet[2850]: W1002 18:50:54.486833 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.487286 kubelet[2850]: E1002 18:50:54.487235 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.492119 kernel: audit: type=1325 audit(1696272654.465:1154): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.465000 audit[3372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe55d10b0 a2=0 a3=ffffa42a26c0 items=0 ppid=3028 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.492785 kubelet[2850]: E1002 18:50:54.492539 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.493450 kubelet[2850]: W1002 18:50:54.493416 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.493596 kubelet[2850]: E1002 18:50:54.493573 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.504693 kernel: audit: type=1300 audit(1696272654.465:1154): arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe55d10b0 a2=0 a3=ffffa42a26c0 items=0 ppid=3028 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.509429 kubelet[2850]: E1002 18:50:54.509041 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.509429 kubelet[2850]: W1002 18:50:54.509076 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.509429 kubelet[2850]: E1002 18:50:54.509112 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.509795 kubelet[2850]: E1002 18:50:54.509755 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.509795 kubelet[2850]: W1002 18:50:54.509788 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.510010 kubelet[2850]: E1002 18:50:54.509822 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.511128 kubelet[2850]: E1002 18:50:54.511044 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.511128 kubelet[2850]: W1002 18:50:54.511077 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.511393 kubelet[2850]: E1002 18:50:54.511213 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.511647 kubelet[2850]: E1002 18:50:54.511614 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.511647 kubelet[2850]: W1002 18:50:54.511643 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.511792 kubelet[2850]: E1002 18:50:54.511673 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.513628 kubelet[2850]: E1002 18:50:54.513221 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.513628 kubelet[2850]: W1002 18:50:54.513369 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.513628 kubelet[2850]: E1002 18:50:54.513409 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.514089 kubelet[2850]: E1002 18:50:54.514054 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.514089 kubelet[2850]: W1002 18:50:54.514085 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.514252 kubelet[2850]: E1002 18:50:54.514118 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.520038 kernel: audit: type=1327 audit(1696272654.465:1154): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.520181 kubelet[2850]: E1002 18:50:54.520150 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.520181 kubelet[2850]: W1002 18:50:54.520177 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.520436 kubelet[2850]: E1002 18:50:54.520211 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.613066 kubelet[2850]: E1002 18:50:54.612944 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.613066 kubelet[2850]: W1002 18:50:54.612974 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.613066 kubelet[2850]: E1002 18:50:54.613008 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.613732 kubelet[2850]: E1002 18:50:54.613682 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.613831 kubelet[2850]: W1002 18:50:54.613722 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.613831 kubelet[2850]: E1002 18:50:54.613794 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.614488 kubelet[2850]: E1002 18:50:54.614440 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.614488 kubelet[2850]: W1002 18:50:54.614476 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.614676 kubelet[2850]: E1002 18:50:54.614516 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.615028 kubelet[2850]: E1002 18:50:54.614985 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.615028 kubelet[2850]: W1002 18:50:54.615017 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.615177 kubelet[2850]: E1002 18:50:54.615059 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.615512 kubelet[2850]: E1002 18:50:54.615485 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.615602 kubelet[2850]: W1002 18:50:54.615512 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.615695 kubelet[2850]: E1002 18:50:54.615663 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.616023 kubelet[2850]: E1002 18:50:54.615996 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.616100 kubelet[2850]: W1002 18:50:54.616021 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.616216 kubelet[2850]: E1002 18:50:54.616184 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.617023 kubelet[2850]: E1002 18:50:54.616997 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.617161 kubelet[2850]: W1002 18:50:54.617134 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.617476 kubelet[2850]: E1002 18:50:54.617454 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.617803 kubelet[2850]: E1002 18:50:54.617783 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.617982 kubelet[2850]: W1002 18:50:54.617956 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.618148 kubelet[2850]: E1002 18:50:54.618111 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.618555 kubelet[2850]: E1002 18:50:54.618532 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.618683 kubelet[2850]: W1002 18:50:54.618659 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.619001 kubelet[2850]: E1002 18:50:54.618980 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.619379 kubelet[2850]: E1002 18:50:54.619358 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.619504 kubelet[2850]: W1002 18:50:54.619480 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.619673 kubelet[2850]: E1002 18:50:54.619636 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.620109 kubelet[2850]: E1002 18:50:54.620087 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.620238 kubelet[2850]: W1002 18:50:54.620214 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.620492 kubelet[2850]: E1002 18:50:54.620456 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.620771 kubelet[2850]: E1002 18:50:54.620751 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.620946 kubelet[2850]: W1002 18:50:54.620921 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.621217 kubelet[2850]: E1002 18:50:54.621196 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.621546 kubelet[2850]: E1002 18:50:54.621526 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.621664 kubelet[2850]: W1002 18:50:54.621640 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.621798 kubelet[2850]: E1002 18:50:54.621776 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.622285 kubelet[2850]: E1002 18:50:54.622254 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.622399 kubelet[2850]: W1002 18:50:54.622283 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.622399 kubelet[2850]: E1002 18:50:54.622327 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.622835 kubelet[2850]: E1002 18:50:54.622804 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.622835 kubelet[2850]: W1002 18:50:54.622833 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.623064 kubelet[2850]: E1002 18:50:54.622895 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.623541 kubelet[2850]: E1002 18:50:54.623510 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.623670 kubelet[2850]: W1002 18:50:54.623540 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.623791 kubelet[2850]: E1002 18:50:54.623766 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.624332 kubelet[2850]: E1002 18:50:54.624293 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.624332 kubelet[2850]: W1002 18:50:54.624322 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.624480 kubelet[2850]: E1002 18:50:54.624353 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.627028 kubelet[2850]: E1002 18:50:54.626995 2850 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:54.627212 kubelet[2850]: W1002 18:50:54.627183 2850 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:54.627337 kubelet[2850]: E1002 18:50:54.627315 2850 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:54.697296 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount461271085.mount: Deactivated successfully. Oct 2 18:50:54.837809 env[1731]: time="2023-10-02T18:50:54.837747790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:54.841672 env[1731]: time="2023-10-02T18:50:54.841619371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:54.846063 env[1731]: time="2023-10-02T18:50:54.845365787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:54.848001 env[1731]: time="2023-10-02T18:50:54.847927916Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:54.849051 env[1731]: time="2023-10-02T18:50:54.849004486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 18:50:54.855129 env[1731]: time="2023-10-02T18:50:54.855055739Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 18:50:54.875653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2972538705.mount: Deactivated successfully. Oct 2 18:50:54.889462 env[1731]: time="2023-10-02T18:50:54.889395853Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae\"" Oct 2 18:50:54.892793 env[1731]: time="2023-10-02T18:50:54.892739291Z" level=info msg="StartContainer for \"371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae\"" Oct 2 18:50:54.954522 systemd[1]: Started cri-containerd-371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae.scope. Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.028591 kernel: audit: type=1400 audit(1696272655.002:1155): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.028758 kernel: audit: type=1300 audit(1696272655.002:1155): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.028815 kernel: audit: type=1327 audit(1696272655.002:1155): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316365633034616430326366646138326635323431343563316330 Oct 2 18:50:55.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316365633034616430326366646138326635323431343563316330 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.048461 kernel: audit: type=1400 audit(1696272655.002:1156): avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.002000 audit: BPF prog-id=139 op=LOAD Oct 2 18:50:55.002000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3259 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316365633034616430326366646138326635323431343563316330 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.010000 audit: BPF prog-id=140 op=LOAD Oct 2 18:50:55.010000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3259 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316365633034616430326366646138326635323431343563316330 Oct 2 18:50:55.027000 audit: BPF prog-id=140 op=UNLOAD Oct 2 18:50:55.027000 audit: BPF prog-id=139 op=UNLOAD Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:55.027000 audit: BPF prog-id=141 op=LOAD Oct 2 18:50:55.027000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3259 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316365633034616430326366646138326635323431343563316330 Oct 2 18:50:55.083443 env[1731]: time="2023-10-02T18:50:55.083360367Z" level=info msg="StartContainer for \"371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae\" returns successfully" Oct 2 18:50:55.111423 systemd[1]: cri-containerd-371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae.scope: Deactivated successfully. Oct 2 18:50:55.115000 audit: BPF prog-id=141 op=UNLOAD Oct 2 18:50:55.168528 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae-rootfs.mount: Deactivated successfully. Oct 2 18:50:55.460084 env[1731]: time="2023-10-02T18:50:55.459992966Z" level=info msg="shim disconnected" id=371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae Oct 2 18:50:55.460365 env[1731]: time="2023-10-02T18:50:55.460089474Z" level=warning msg="cleaning up after shim disconnected" id=371cec04ad02cfda82f524145c1c0301ee04db2421f56b0f0d0c16a9b7a187ae namespace=k8s.io Oct 2 18:50:55.460365 env[1731]: time="2023-10-02T18:50:55.460113943Z" level=info msg="cleaning up dead shim" Oct 2 18:50:55.489401 env[1731]: time="2023-10-02T18:50:55.489319726Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:50:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3453 runtime=io.containerd.runc.v2\n" Oct 2 18:50:56.396233 env[1731]: time="2023-10-02T18:50:56.396153810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 18:51:01.045642 env[1731]: time="2023-10-02T18:51:01.045571809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:01.048538 env[1731]: time="2023-10-02T18:51:01.048471570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:01.053932 env[1731]: time="2023-10-02T18:51:01.053815962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:01.057053 env[1731]: time="2023-10-02T18:51:01.056990113Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:01.058318 env[1731]: time="2023-10-02T18:51:01.058265777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 18:51:01.067261 env[1731]: time="2023-10-02T18:51:01.067204877Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 18:51:01.090823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3550567380.mount: Deactivated successfully. Oct 2 18:51:01.103347 env[1731]: time="2023-10-02T18:51:01.103283359Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279\"" Oct 2 18:51:01.112889 env[1731]: time="2023-10-02T18:51:01.108341047Z" level=info msg="StartContainer for \"6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279\"" Oct 2 18:51:01.169942 systemd[1]: Started cri-containerd-6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279.scope. Oct 2 18:51:01.217000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.220912 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 18:51:01.221033 kernel: audit: type=1400 audit(1696272661.217:1162): avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.217000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:01.241942 kernel: audit: type=1300 audit(1696272661.217:1162): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:01.242099 kernel: audit: type=1327 audit(1696272661.217:1162): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323933343562643031663037336361343936363466306439636361 Oct 2 18:51:01.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323933343562643031663037336361343936363466306439636361 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.260903 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.278885 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.279027 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.287954 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.297220 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.297365 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.314349 kernel: audit: type=1400 audit(1696272661.218:1163): avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.218000 audit: BPF prog-id=142 op=LOAD Oct 2 18:51:01.218000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3259 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:01.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323933343562643031663037336361343936363466306439636361 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.222000 audit: BPF prog-id=143 op=LOAD Oct 2 18:51:01.222000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3259 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:01.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323933343562643031663037336361343936363466306439636361 Oct 2 18:51:01.227000 audit: BPF prog-id=143 op=UNLOAD Oct 2 18:51:01.227000 audit: BPF prog-id=142 op=UNLOAD Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:01.227000 audit: BPF prog-id=144 op=LOAD Oct 2 18:51:01.227000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3259 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:01.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323933343562643031663037336361343936363466306439636361 Oct 2 18:51:01.323940 env[1731]: time="2023-10-02T18:51:01.323877821Z" level=info msg="StartContainer for \"6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279\" returns successfully" Oct 2 18:51:02.338873 env[1731]: time="2023-10-02T18:51:02.338750630Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:51:02.345227 systemd[1]: cri-containerd-6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279.scope: Deactivated successfully. Oct 2 18:51:02.348000 audit: BPF prog-id=144 op=UNLOAD Oct 2 18:51:02.395756 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279-rootfs.mount: Deactivated successfully. Oct 2 18:51:02.421505 kubelet[2850]: I1002 18:51:02.418801 2850 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 18:51:02.468450 kubelet[2850]: I1002 18:51:02.468401 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:51:02.481307 systemd[1]: Created slice kubepods-burstable-pod93421757_6fcc_487a_a737_db1cd9384428.slice. Oct 2 18:51:02.492888 kubelet[2850]: I1002 18:51:02.490611 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:51:02.494731 kubelet[2850]: I1002 18:51:02.494656 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:51:02.506506 systemd[1]: Created slice kubepods-besteffort-pod665089a4_40c2_46ec_aa3b_93c7551b8968.slice. Oct 2 18:51:02.520742 kubelet[2850]: W1002 18:51:02.519676 2850 reflector.go:533] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:51:02.520742 kubelet[2850]: E1002 18:51:02.519737 2850 reflector.go:148] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-28-180" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-28-180' and this object Oct 2 18:51:02.524832 kubelet[2850]: I1002 18:51:02.521886 2850 topology_manager.go:212] "Topology Admit Handler" Oct 2 18:51:02.533774 systemd[1]: Created slice kubepods-burstable-pod8e2ab800_7d23_4d37_b6ef_e38063f4389c.slice. Oct 2 18:51:02.552934 systemd[1]: Created slice kubepods-besteffort-pod00e2fb11_591a_4ca5_a0b8_307db6198bfb.slice. Oct 2 18:51:02.588711 kubelet[2850]: I1002 18:51:02.588666 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fcpn8\" (UniqueName: \"kubernetes.io/projected/93421757-6fcc-487a-a737-db1cd9384428-kube-api-access-fcpn8\") pod \"coredns-5d78c9869d-njdxr\" (UID: \"93421757-6fcc-487a-a737-db1cd9384428\") " pod="kube-system/coredns-5d78c9869d-njdxr" Oct 2 18:51:02.589199 kubelet[2850]: I1002 18:51:02.589102 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/93421757-6fcc-487a-a737-db1cd9384428-config-volume\") pod \"coredns-5d78c9869d-njdxr\" (UID: \"93421757-6fcc-487a-a737-db1cd9384428\") " pod="kube-system/coredns-5d78c9869d-njdxr" Oct 2 18:51:02.690299 kubelet[2850]: I1002 18:51:02.690260 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/00e2fb11-591a-4ca5-a0b8-307db6198bfb-etccalico\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.690765 kubelet[2850]: I1002 18:51:02.690739 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/00e2fb11-591a-4ca5-a0b8-307db6198bfb-registration-dir\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.691063 kubelet[2850]: I1002 18:51:02.691041 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4b47g\" (UniqueName: \"kubernetes.io/projected/00e2fb11-591a-4ca5-a0b8-307db6198bfb-kube-api-access-4b47g\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.691341 kubelet[2850]: I1002 18:51:02.691301 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8e2ab800-7d23-4d37-b6ef-e38063f4389c-config-volume\") pod \"coredns-5d78c9869d-qcnqm\" (UID: \"8e2ab800-7d23-4d37-b6ef-e38063f4389c\") " pod="kube-system/coredns-5d78c9869d-qcnqm" Oct 2 18:51:02.691567 kubelet[2850]: I1002 18:51:02.691546 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/00e2fb11-591a-4ca5-a0b8-307db6198bfb-varrun\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.692253 kubelet[2850]: I1002 18:51:02.692224 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxqr7\" (UniqueName: \"kubernetes.io/projected/8e2ab800-7d23-4d37-b6ef-e38063f4389c-kube-api-access-pxqr7\") pod \"coredns-5d78c9869d-qcnqm\" (UID: \"8e2ab800-7d23-4d37-b6ef-e38063f4389c\") " pod="kube-system/coredns-5d78c9869d-qcnqm" Oct 2 18:51:02.692674 kubelet[2850]: I1002 18:51:02.692648 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/00e2fb11-591a-4ca5-a0b8-307db6198bfb-kubelet-dir\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.693317 kubelet[2850]: I1002 18:51:02.693269 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/00e2fb11-591a-4ca5-a0b8-307db6198bfb-socket-dir\") pod \"csi-node-driver-jkt5t\" (UID: \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\") " pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:02.693627 kubelet[2850]: I1002 18:51:02.693542 2850 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n9cdx\" (UniqueName: \"kubernetes.io/projected/665089a4-40c2-46ec-aa3b-93c7551b8968-kube-api-access-n9cdx\") pod \"calico-kube-controllers-7bd445fdb4-j75ns\" (UID: \"665089a4-40c2-46ec-aa3b-93c7551b8968\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" Oct 2 18:51:02.860184 env[1731]: time="2023-10-02T18:51:02.859752342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkt5t,Uid:00e2fb11-591a-4ca5-a0b8-307db6198bfb,Namespace:calico-system,Attempt:0,}" Oct 2 18:51:03.148000 env[1731]: time="2023-10-02T18:51:03.146949015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-j75ns,Uid:665089a4-40c2-46ec-aa3b-93c7551b8968,Namespace:calico-system,Attempt:0,}" Oct 2 18:51:03.398444 env[1731]: time="2023-10-02T18:51:03.397953331Z" level=info msg="shim disconnected" id=6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279 Oct 2 18:51:03.398444 env[1731]: time="2023-10-02T18:51:03.398018721Z" level=warning msg="cleaning up after shim disconnected" id=6c29345bd01f073ca49664f0d9ccacc1013ad67a16ceaf6ff69a1ddbb3cea279 namespace=k8s.io Oct 2 18:51:03.398444 env[1731]: time="2023-10-02T18:51:03.398040898Z" level=info msg="cleaning up dead shim" Oct 2 18:51:03.452360 env[1731]: time="2023-10-02T18:51:03.452289093Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:51:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3526 runtime=io.containerd.runc.v2\n" Oct 2 18:51:03.612633 env[1731]: time="2023-10-02T18:51:03.612535682Z" level=error msg="Failed to destroy network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.613402 env[1731]: time="2023-10-02T18:51:03.613318029Z" level=error msg="encountered an error cleaning up failed sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.613545 env[1731]: time="2023-10-02T18:51:03.613420981Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkt5t,Uid:00e2fb11-591a-4ca5-a0b8-307db6198bfb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.613789 kubelet[2850]: E1002 18:51:03.613753 2850 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.616911 kubelet[2850]: E1002 18:51:03.613862 2850 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:03.616911 kubelet[2850]: E1002 18:51:03.613928 2850 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jkt5t" Oct 2 18:51:03.616911 kubelet[2850]: E1002 18:51:03.614031 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:03.629684 env[1731]: time="2023-10-02T18:51:03.629611150Z" level=error msg="Failed to destroy network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.630563 env[1731]: time="2023-10-02T18:51:03.630500709Z" level=error msg="encountered an error cleaning up failed sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.630790 env[1731]: time="2023-10-02T18:51:03.630740874Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-j75ns,Uid:665089a4-40c2-46ec-aa3b-93c7551b8968,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.631305 kubelet[2850]: E1002 18:51:03.631247 2850 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:03.631532 kubelet[2850]: E1002 18:51:03.631339 2850 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" Oct 2 18:51:03.631532 kubelet[2850]: E1002 18:51:03.631379 2850 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" Oct 2 18:51:03.631532 kubelet[2850]: E1002 18:51:03.631469 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-j75ns_calico-system(665089a4-40c2-46ec-aa3b-93c7551b8968)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-j75ns_calico-system(665089a4-40c2-46ec-aa3b-93c7551b8968)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" podUID=665089a4-40c2-46ec-aa3b-93c7551b8968 Oct 2 18:51:03.691611 kubelet[2850]: E1002 18:51:03.691230 2850 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:03.691611 kubelet[2850]: E1002 18:51:03.691328 2850 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/93421757-6fcc-487a-a737-db1cd9384428-config-volume podName:93421757-6fcc-487a-a737-db1cd9384428 nodeName:}" failed. No retries permitted until 2023-10-02 18:51:04.191300728 +0000 UTC m=+35.377337265 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/93421757-6fcc-487a-a737-db1cd9384428-config-volume") pod "coredns-5d78c9869d-njdxr" (UID: "93421757-6fcc-487a-a737-db1cd9384428") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:04.050186 env[1731]: time="2023-10-02T18:51:04.050018916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qcnqm,Uid:8e2ab800-7d23-4d37-b6ef-e38063f4389c,Namespace:kube-system,Attempt:0,}" Oct 2 18:51:04.088864 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b-shm.mount: Deactivated successfully. Oct 2 18:51:04.089046 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81-shm.mount: Deactivated successfully. Oct 2 18:51:04.218453 env[1731]: time="2023-10-02T18:51:04.218366404Z" level=error msg="Failed to destroy network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.221499 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272-shm.mount: Deactivated successfully. Oct 2 18:51:04.223556 env[1731]: time="2023-10-02T18:51:04.223471989Z" level=error msg="encountered an error cleaning up failed sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.223659 env[1731]: time="2023-10-02T18:51:04.223584470Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qcnqm,Uid:8e2ab800-7d23-4d37-b6ef-e38063f4389c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.224656 kubelet[2850]: E1002 18:51:04.223953 2850 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.224656 kubelet[2850]: E1002 18:51:04.224081 2850 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-qcnqm" Oct 2 18:51:04.224656 kubelet[2850]: E1002 18:51:04.224124 2850 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-qcnqm" Oct 2 18:51:04.225017 kubelet[2850]: E1002 18:51:04.224252 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-qcnqm_kube-system(8e2ab800-7d23-4d37-b6ef-e38063f4389c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-qcnqm_kube-system(8e2ab800-7d23-4d37-b6ef-e38063f4389c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-qcnqm" podUID=8e2ab800-7d23-4d37-b6ef-e38063f4389c Oct 2 18:51:04.292036 env[1731]: time="2023-10-02T18:51:04.291838316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-njdxr,Uid:93421757-6fcc-487a-a737-db1cd9384428,Namespace:kube-system,Attempt:0,}" Oct 2 18:51:04.459874 env[1731]: time="2023-10-02T18:51:04.457759875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 18:51:04.463642 env[1731]: time="2023-10-02T18:51:04.463568507Z" level=error msg="Failed to destroy network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.468717 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158-shm.mount: Deactivated successfully. Oct 2 18:51:04.473635 env[1731]: time="2023-10-02T18:51:04.472331893Z" level=error msg="encountered an error cleaning up failed sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.473635 env[1731]: time="2023-10-02T18:51:04.472440773Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-njdxr,Uid:93421757-6fcc-487a-a737-db1cd9384428,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.473911 kubelet[2850]: I1002 18:51:04.472926 2850 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:04.475044 kubelet[2850]: E1002 18:51:04.475010 2850 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.475212 env[1731]: time="2023-10-02T18:51:04.475115808Z" level=info msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" Oct 2 18:51:04.475491 kubelet[2850]: E1002 18:51:04.475361 2850 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-njdxr" Oct 2 18:51:04.475705 kubelet[2850]: E1002 18:51:04.475682 2850 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-njdxr" Oct 2 18:51:04.475988 kubelet[2850]: E1002 18:51:04.475964 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-njdxr_kube-system(93421757-6fcc-487a-a737-db1cd9384428)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-njdxr_kube-system(93421757-6fcc-487a-a737-db1cd9384428)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-njdxr" podUID=93421757-6fcc-487a-a737-db1cd9384428 Oct 2 18:51:04.479692 kubelet[2850]: I1002 18:51:04.479641 2850 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:04.482689 env[1731]: time="2023-10-02T18:51:04.482603809Z" level=info msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" Oct 2 18:51:04.499349 kubelet[2850]: I1002 18:51:04.498028 2850 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:04.499567 env[1731]: time="2023-10-02T18:51:04.499227259Z" level=info msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" Oct 2 18:51:04.605288 env[1731]: time="2023-10-02T18:51:04.605178808Z" level=error msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" failed" error="failed to destroy network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.607053 kubelet[2850]: E1002 18:51:04.606715 2850 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:04.607053 kubelet[2850]: E1002 18:51:04.606813 2850 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b} Oct 2 18:51:04.607053 kubelet[2850]: E1002 18:51:04.606910 2850 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"665089a4-40c2-46ec-aa3b-93c7551b8968\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:04.607053 kubelet[2850]: E1002 18:51:04.606992 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"665089a4-40c2-46ec-aa3b-93c7551b8968\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" podUID=665089a4-40c2-46ec-aa3b-93c7551b8968 Oct 2 18:51:04.626330 env[1731]: time="2023-10-02T18:51:04.626186278Z" level=error msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" failed" error="failed to destroy network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.627205 kubelet[2850]: E1002 18:51:04.626810 2850 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:04.627205 kubelet[2850]: E1002 18:51:04.626980 2850 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81} Oct 2 18:51:04.627205 kubelet[2850]: E1002 18:51:04.627069 2850 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:04.627205 kubelet[2850]: E1002 18:51:04.627147 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00e2fb11-591a-4ca5-a0b8-307db6198bfb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:04.650771 env[1731]: time="2023-10-02T18:51:04.650675923Z" level=error msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" failed" error="failed to destroy network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:04.651597 kubelet[2850]: E1002 18:51:04.651250 2850 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:04.651597 kubelet[2850]: E1002 18:51:04.651333 2850 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272} Oct 2 18:51:04.651597 kubelet[2850]: E1002 18:51:04.651428 2850 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e2ab800-7d23-4d37-b6ef-e38063f4389c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:04.651597 kubelet[2850]: E1002 18:51:04.651507 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e2ab800-7d23-4d37-b6ef-e38063f4389c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-qcnqm" podUID=8e2ab800-7d23-4d37-b6ef-e38063f4389c Oct 2 18:51:05.502602 kubelet[2850]: I1002 18:51:05.502527 2850 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:05.507212 env[1731]: time="2023-10-02T18:51:05.504191738Z" level=info msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" Oct 2 18:51:05.590471 env[1731]: time="2023-10-02T18:51:05.590122007Z" level=error msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" failed" error="failed to destroy network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:05.590723 kubelet[2850]: E1002 18:51:05.590682 2850 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:05.590831 kubelet[2850]: E1002 18:51:05.590776 2850 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158} Oct 2 18:51:05.590929 kubelet[2850]: E1002 18:51:05.590910 2850 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"93421757-6fcc-487a-a737-db1cd9384428\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:05.591050 kubelet[2850]: E1002 18:51:05.590992 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"93421757-6fcc-487a-a737-db1cd9384428\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-njdxr" podUID=93421757-6fcc-487a-a737-db1cd9384428 Oct 2 18:51:10.463246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2021339180.mount: Deactivated successfully. Oct 2 18:51:10.573964 env[1731]: time="2023-10-02T18:51:10.573885661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:10.576691 env[1731]: time="2023-10-02T18:51:10.576629296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:10.579506 env[1731]: time="2023-10-02T18:51:10.579442281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:10.582048 env[1731]: time="2023-10-02T18:51:10.581995217Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:10.583111 env[1731]: time="2023-10-02T18:51:10.583067048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 18:51:10.591632 env[1731]: time="2023-10-02T18:51:10.591545449Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 18:51:10.614166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1801073163.mount: Deactivated successfully. Oct 2 18:51:10.625081 env[1731]: time="2023-10-02T18:51:10.624946432Z" level=info msg="CreateContainer within sandbox \"45aa6b35ff6af94b33e31a97fdbe1892d445e14a21ce437c9184d063100c4a06\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064\"" Oct 2 18:51:10.628109 env[1731]: time="2023-10-02T18:51:10.627492240Z" level=info msg="StartContainer for \"10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064\"" Oct 2 18:51:10.685262 systemd[1]: Started cri-containerd-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064.scope. Oct 2 18:51:10.753477 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 18:51:10.753669 kernel: audit: type=1400 audit(1696272670.742:1169): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:10.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130626239333139626432346563323337376266653037386164643938 Oct 2 18:51:10.777255 kernel: audit: type=1300 audit(1696272670.742:1169): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3259 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:10.777396 kernel: audit: type=1327 audit(1696272670.742:1169): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130626239333139626432346563323337376266653037386164643938 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.785896 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.794877 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.812225 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.812344 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.828379 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.828483 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.838879 kernel: audit: type=1400 audit(1696272670.742:1170): avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.742000 audit: BPF prog-id=145 op=LOAD Oct 2 18:51:10.742000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3259 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:10.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130626239333139626432346563323337376266653037386164643938 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.745000 audit: BPF prog-id=146 op=LOAD Oct 2 18:51:10.745000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3259 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:10.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130626239333139626432346563323337376266653037386164643938 Oct 2 18:51:10.754000 audit: BPF prog-id=146 op=UNLOAD Oct 2 18:51:10.754000 audit: BPF prog-id=145 op=UNLOAD Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { perfmon } for pid=3750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit[3750]: AVC avc: denied { bpf } for pid=3750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:10.754000 audit: BPF prog-id=147 op=LOAD Oct 2 18:51:10.754000 audit[3750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3259 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:10.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130626239333139626432346563323337376266653037386164643938 Oct 2 18:51:10.845608 env[1731]: time="2023-10-02T18:51:10.845551267Z" level=info msg="StartContainer for \"10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064\" returns successfully" Oct 2 18:51:10.993157 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 18:51:10.993331 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 18:51:12.571922 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.tKpLuX.mount: Deactivated successfully. Oct 2 18:51:12.917000 audit[3882]: AVC avc: denied { write } for pid=3882 comm="tee" name="fd" dev="proc" ino=20242 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:12.917000 audit[3882]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1075981 a2=241 a3=1b6 items=1 ppid=3864 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:12.917000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 18:51:12.917000 audit: PATH item=0 name="/dev/fd/63" inode=20939 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:12.917000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:12.980000 audit[3896]: AVC avc: denied { write } for pid=3896 comm="tee" name="fd" dev="proc" ino=20268 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:12.980000 audit[3896]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc80bc981 a2=241 a3=1b6 items=1 ppid=3870 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:12.980000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 18:51:12.980000 audit: PATH item=0 name="/dev/fd/63" inode=20252 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:12.980000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.003000 audit[3898]: AVC avc: denied { write } for pid=3898 comm="tee" name="fd" dev="proc" ino=20965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:13.003000 audit[3898]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff27d6971 a2=241 a3=1b6 items=1 ppid=3862 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.003000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 18:51:13.003000 audit: PATH item=0 name="/dev/fd/63" inode=20255 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:13.007000 audit[3908]: AVC avc: denied { write } for pid=3908 comm="tee" name="fd" dev="proc" ino=20274 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:13.007000 audit[3908]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff437f982 a2=241 a3=1b6 items=1 ppid=3860 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.007000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 18:51:13.007000 audit: PATH item=0 name="/dev/fd/63" inode=20258 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:13.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.018000 audit[3914]: AVC avc: denied { write } for pid=3914 comm="tee" name="fd" dev="proc" ino=20276 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:13.018000 audit[3914]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc8220972 a2=241 a3=1b6 items=1 ppid=3858 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.018000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 18:51:13.018000 audit: PATH item=0 name="/dev/fd/63" inode=20954 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:13.018000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.028000 audit[3928]: AVC avc: denied { write } for pid=3928 comm="tee" name="fd" dev="proc" ino=20280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:13.028000 audit[3928]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe35dd983 a2=241 a3=1b6 items=1 ppid=3865 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.028000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 18:51:13.028000 audit: PATH item=0 name="/dev/fd/63" inode=20964 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:13.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.031000 audit[3926]: AVC avc: denied { write } for pid=3926 comm="tee" name="fd" dev="proc" ino=20284 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:13.031000 audit[3926]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff22cb981 a2=241 a3=1b6 items=1 ppid=3868 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.031000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 18:51:13.031000 audit: PATH item=0 name="/dev/fd/63" inode=20963 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:13.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:13.834393 (udev-worker)[3782]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:51:13.836217 (udev-worker)[3995]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.841000 audit: BPF prog-id=148 op=LOAD Oct 2 18:51:13.841000 audit[3998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcff2e1f8 a2=70 a3=0 items=0 ppid=3867 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.841000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:13.848000 audit: BPF prog-id=148 op=UNLOAD Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit: BPF prog-id=149 op=LOAD Oct 2 18:51:13.848000 audit[3998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcff2e1f8 a2=70 a3=4a174c items=0 ppid=3867 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.848000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:13.848000 audit: BPF prog-id=149 op=UNLOAD Oct 2 18:51:13.848000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.848000 audit[3998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffcff2e228 a2=70 a3=15c5373f items=0 ppid=3867 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.848000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.849000 audit: BPF prog-id=150 op=LOAD Oct 2 18:51:13.849000 audit[3998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffcff2e178 a2=70 a3=15c53759 items=0 ppid=3867 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.849000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:13.869000 audit[4000]: AVC avc: denied { bpf } for pid=4000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.869000 audit[4000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcc4cb968 a2=70 a3=0 items=0 ppid=3867 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:51:13.869000 audit[4000]: AVC avc: denied { bpf } for pid=4000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:13.869000 audit[4000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcc4cb848 a2=70 a3=2 items=0 ppid=3867 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:13.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:51:13.889000 audit: BPF prog-id=150 op=UNLOAD Oct 2 18:51:14.047000 audit[4024]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=4024 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:14.047000 audit[4024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffdef6fb90 a2=0 a3=ffffb2ce4fa0 items=0 ppid=3867 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:14.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:14.050000 audit[4027]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:14.050000 audit[4027]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd21db320 a2=0 a3=ffff94c93fa0 items=0 ppid=3867 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:14.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:14.055000 audit[4025]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:14.055000 audit[4025]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffed8ad0d0 a2=0 a3=ffffbe8cdfa0 items=0 ppid=3867 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:14.055000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:14.064000 audit[4030]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:14.064000 audit[4030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd8647160 a2=0 a3=ffff95833fa0 items=0 ppid=3867 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:14.064000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:14.587648 systemd-networkd[1540]: vxlan.calico: Link UP Oct 2 18:51:14.587662 systemd-networkd[1540]: vxlan.calico: Gained carrier Oct 2 18:51:15.830040 systemd-networkd[1540]: vxlan.calico: Gained IPv6LL Oct 2 18:51:16.239148 env[1731]: time="2023-10-02T18:51:16.239082165Z" level=info msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" Oct 2 18:51:16.239960 env[1731]: time="2023-10-02T18:51:16.239902259Z" level=info msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" Oct 2 18:51:16.375402 kubelet[2850]: I1002 18:51:16.375020 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tszhs" podStartSLOduration=6.999520876 podCreationTimestamp="2023-10-02 18:50:49 +0000 UTC" firstStartedPulling="2023-10-02 18:50:50.208112595 +0000 UTC m=+21.394149132" lastFinishedPulling="2023-10-02 18:51:10.583533396 +0000 UTC m=+41.769569933" observedRunningTime="2023-10-02 18:51:11.583017618 +0000 UTC m=+42.769054179" watchObservedRunningTime="2023-10-02 18:51:16.374941677 +0000 UTC m=+47.560978214" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.378 [INFO][4087] k8s.go 576: Cleaning up netns ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.379 [INFO][4087] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" iface="eth0" netns="/var/run/netns/cni-426b819c-52a6-f154-1af5-e2eb760a8bca" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.380 [INFO][4087] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" iface="eth0" netns="/var/run/netns/cni-426b819c-52a6-f154-1af5-e2eb760a8bca" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.380 [INFO][4087] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" iface="eth0" netns="/var/run/netns/cni-426b819c-52a6-f154-1af5-e2eb760a8bca" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.380 [INFO][4087] k8s.go 583: Releasing IP address(es) ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.381 [INFO][4087] utils.go 196: Calico CNI releasing IP address ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.458 [INFO][4098] ipam_plugin.go 416: Releasing address using handleID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.485003 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:16.485003 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.474 [WARNING][4098] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.474 [INFO][4098] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.485003 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:16.485003 env[1731]: 2023-10-02 18:51:16.481 [INFO][4087] k8s.go 589: Teardown processing complete. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:16.488948 systemd[1]: run-netns-cni\x2d426b819c\x2d52a6\x2df154\x2d1af5\x2de2eb760a8bca.mount: Deactivated successfully. Oct 2 18:51:16.491335 env[1731]: time="2023-10-02T18:51:16.491277944Z" level=info msg="TearDown network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" successfully" Oct 2 18:51:16.491534 env[1731]: time="2023-10-02T18:51:16.491468931Z" level=info msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" returns successfully" Oct 2 18:51:16.492952 env[1731]: time="2023-10-02T18:51:16.492899245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qcnqm,Uid:8e2ab800-7d23-4d37-b6ef-e38063f4389c,Namespace:kube-system,Attempt:1,}" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.385 [INFO][4086] k8s.go 576: Cleaning up netns ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.385 [INFO][4086] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" iface="eth0" netns="/var/run/netns/cni-1605e65b-8e9b-a8c6-e2fb-6cf85e9f55c1" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.386 [INFO][4086] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" iface="eth0" netns="/var/run/netns/cni-1605e65b-8e9b-a8c6-e2fb-6cf85e9f55c1" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.386 [INFO][4086] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" iface="eth0" netns="/var/run/netns/cni-1605e65b-8e9b-a8c6-e2fb-6cf85e9f55c1" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.386 [INFO][4086] k8s.go 583: Releasing IP address(es) ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.386 [INFO][4086] utils.go 196: Calico CNI releasing IP address ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.466 [INFO][4099] ipam_plugin.go 416: Releasing address using handleID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:16.519838 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:16.519838 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.503 [WARNING][4099] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.503 [INFO][4099] ipam_plugin.go 444: Releasing address using workloadID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:16.519838 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:16.519838 env[1731]: 2023-10-02 18:51:16.516 [INFO][4086] k8s.go 589: Teardown processing complete. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:16.522984 systemd[1]: run-netns-cni\x2d1605e65b\x2d8e9b\x2da8c6\x2de2fb\x2d6cf85e9f55c1.mount: Deactivated successfully. Oct 2 18:51:16.524898 env[1731]: time="2023-10-02T18:51:16.524810614Z" level=info msg="TearDown network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" successfully" Oct 2 18:51:16.525065 env[1731]: time="2023-10-02T18:51:16.525030965Z" level=info msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" returns successfully" Oct 2 18:51:16.540280 env[1731]: time="2023-10-02T18:51:16.538074104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-j75ns,Uid:665089a4-40c2-46ec-aa3b-93c7551b8968,Namespace:calico-system,Attempt:1,}" Oct 2 18:51:16.815385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:51:16.815557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali85968f78c4d: link becomes ready Oct 2 18:51:16.823815 systemd-networkd[1540]: cali85968f78c4d: Link UP Oct 2 18:51:16.823836 systemd-networkd[1540]: cali85968f78c4d: Gained carrier Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.636 [INFO][4110] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0 coredns-5d78c9869d- kube-system 8e2ab800-7d23-4d37-b6ef-e38063f4389c 697 0 2023-10-02 18:50:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-180 coredns-5d78c9869d-qcnqm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali85968f78c4d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.637 [INFO][4110] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.731 [INFO][4133] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" HandleID="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.754 [INFO][4133] ipam_plugin.go 269: Auto assigning IP ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" HandleID="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400049b2e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-180", "pod":"coredns-5d78c9869d-qcnqm", "timestamp":"2023-10-02 18:51:16.731423677 +0000 UTC"}, Hostname:"ip-172-31-28-180", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:16.866880 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:16.866880 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.755 [INFO][4133] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-180' Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.758 [INFO][4133] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.766 [INFO][4133] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.773 [INFO][4133] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.776 [INFO][4133] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.780 [INFO][4133] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.780 [INFO][4133] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.783 [INFO][4133] ipam.go 1682: Creating new handle: k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65 Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.790 [INFO][4133] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.804 [INFO][4133] ipam.go 1216: Successfully claimed IPs: [192.168.4.65/26] block=192.168.4.64/26 handle="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.804 [INFO][4133] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.65/26] handle="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" host="ip-172-31-28-180" Oct 2 18:51:16.866880 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:16.866880 env[1731]: 2023-10-02 18:51:16.804 [INFO][4133] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.4.65/26] IPv6=[] ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" HandleID="k8s-pod-network.2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.807 [INFO][4110] k8s.go 383: Populated endpoint ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8e2ab800-7d23-4d37-b6ef-e38063f4389c", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"", Pod:"coredns-5d78c9869d-qcnqm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali85968f78c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.808 [INFO][4110] k8s.go 384: Calico CNI using IPs: [192.168.4.65/32] ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.808 [INFO][4110] dataplane_linux.go 68: Setting the host side veth name to cali85968f78c4d ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.816 [INFO][4110] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.824 [INFO][4110] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8e2ab800-7d23-4d37-b6ef-e38063f4389c", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65", Pod:"coredns-5d78c9869d-qcnqm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali85968f78c4d", MAC:"ce:5e:67:66:2e:ef", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:16.868150 env[1731]: 2023-10-02 18:51:16.856 [INFO][4110] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65" Namespace="kube-system" Pod="coredns-5d78c9869d-qcnqm" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:16.944412 env[1731]: time="2023-10-02T18:51:16.943558850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:16.944412 env[1731]: time="2023-10-02T18:51:16.943630633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:16.944412 env[1731]: time="2023-10-02T18:51:16.943656564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:16.949904 env[1731]: time="2023-10-02T18:51:16.945179024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65 pid=4167 runtime=io.containerd.runc.v2 Oct 2 18:51:16.985874 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali293f3e7cd69: link becomes ready Oct 2 18:51:16.986000 audit[4183]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:16.990886 kernel: kauditd_printk_skb: 129 callbacks suppressed Oct 2 18:51:16.990992 kernel: audit: type=1325 audit(1696272676.986:1195): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:16.986000 audit[4183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffd4fb0980 a2=0 a3=ffffa5382fa0 items=0 ppid=3867 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.011032 kernel: audit: type=1300 audit(1696272676.986:1195): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffd4fb0980 a2=0 a3=ffffa5382fa0 items=0 ppid=3867 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.012795 systemd-networkd[1540]: cali293f3e7cd69: Link UP Oct 2 18:51:17.012814 systemd-networkd[1540]: cali293f3e7cd69: Gained carrier Oct 2 18:51:16.986000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:17.024515 kernel: audit: type=1327 audit(1696272676.986:1195): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.695 [INFO][4122] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0 calico-kube-controllers-7bd445fdb4- calico-system 665089a4-40c2-46ec-aa3b-93c7551b8968 698 0 2023-10-02 18:50:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-28-180 calico-kube-controllers-7bd445fdb4-j75ns eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali293f3e7cd69 [] []}} ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.696 [INFO][4122] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.863 [INFO][4139] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" HandleID="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.906 [INFO][4139] ipam_plugin.go 269: Auto assigning IP ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" HandleID="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004db10), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-180", "pod":"calico-kube-controllers-7bd445fdb4-j75ns", "timestamp":"2023-10-02 18:51:16.86367288 +0000 UTC"}, Hostname:"ip-172-31-28-180", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:17.037830 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:17.037830 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.907 [INFO][4139] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-180' Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.912 [INFO][4139] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.919 [INFO][4139] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.928 [INFO][4139] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.935 [INFO][4139] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.941 [INFO][4139] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.941 [INFO][4139] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.946 [INFO][4139] ipam.go 1682: Creating new handle: k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555 Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.956 [INFO][4139] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.971 [INFO][4139] ipam.go 1216: Successfully claimed IPs: [192.168.4.66/26] block=192.168.4.64/26 handle="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.971 [INFO][4139] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.66/26] handle="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" host="ip-172-31-28-180" Oct 2 18:51:17.037830 env[1731]: time="2023-10-02T18:51:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:17.037830 env[1731]: 2023-10-02 18:51:16.971 [INFO][4139] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.4.66/26] IPv6=[] ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" HandleID="k8s-pod-network.e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:16.976 [INFO][4122] k8s.go 383: Populated endpoint ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"665089a4-40c2-46ec-aa3b-93c7551b8968", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-j75ns", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali293f3e7cd69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:16.976 [INFO][4122] k8s.go 384: Calico CNI using IPs: [192.168.4.66/32] ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:16.976 [INFO][4122] dataplane_linux.go 68: Setting the host side veth name to cali293f3e7cd69 ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:16.981 [INFO][4122] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:17.015 [INFO][4122] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"665089a4-40c2-46ec-aa3b-93c7551b8968", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555", Pod:"calico-kube-controllers-7bd445fdb4-j75ns", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali293f3e7cd69", MAC:"52:85:10:07:40:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:17.039456 env[1731]: 2023-10-02 18:51:17.033 [INFO][4122] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-j75ns" WorkloadEndpoint="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:17.073996 systemd[1]: Started cri-containerd-2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65.scope. Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158600 kernel: audit: type=1400 audit(1696272677.142:1196): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158722 kernel: audit: type=1400 audit(1696272677.142:1197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.160739 env[1731]: time="2023-10-02T18:51:17.160492440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:17.160739 env[1731]: time="2023-10-02T18:51:17.160688599Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:17.161001 env[1731]: time="2023-10-02T18:51:17.160777289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:17.161466 env[1731]: time="2023-10-02T18:51:17.161373098Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555 pid=4215 runtime=io.containerd.runc.v2 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.174477 kernel: audit: type=1400 audit(1696272677.142:1198): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.188870 kernel: audit: type=1400 audit(1696272677.142:1199): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.188988 kernel: audit: type=1400 audit(1696272677.142:1200): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.195868 kernel: audit: type=1400 audit(1696272677.142:1201): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.205867 kernel: audit: type=1400 audit(1696272677.142:1202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.150000 audit: BPF prog-id=151 op=LOAD Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4167 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323436326237313236626330353331306561376434653364346335 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4167 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323436326237313236626330353331306561376434653364346335 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit: BPF prog-id=152 op=LOAD Oct 2 18:51:17.158000 audit[4177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4167 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323436326237313236626330353331306561376434653364346335 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit: BPF prog-id=153 op=LOAD Oct 2 18:51:17.158000 audit[4177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4167 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323436326237313236626330353331306561376434653364346335 Oct 2 18:51:17.158000 audit: BPF prog-id=153 op=UNLOAD Oct 2 18:51:17.158000 audit: BPF prog-id=152 op=UNLOAD Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.158000 audit: BPF prog-id=154 op=LOAD Oct 2 18:51:17.158000 audit[4177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4167 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323436326237313236626330353331306561376434653364346335 Oct 2 18:51:17.164000 audit[4226]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:17.164000 audit[4226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffd59b2cd0 a2=0 a3=ffff9b262fa0 items=0 ppid=3867 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.164000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:17.231553 systemd[1]: Started cri-containerd-e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555.scope. Oct 2 18:51:17.261904 env[1731]: time="2023-10-02T18:51:17.261809740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qcnqm,Uid:8e2ab800-7d23-4d37-b6ef-e38063f4389c,Namespace:kube-system,Attempt:1,} returns sandbox id \"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65\"" Oct 2 18:51:17.270894 env[1731]: time="2023-10-02T18:51:17.270821396Z" level=info msg="CreateContainer within sandbox \"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:51:17.297722 env[1731]: time="2023-10-02T18:51:17.297648746Z" level=info msg="CreateContainer within sandbox \"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4920a5b675f302dec109f88862eb59181aeba083188850df81200280b5105ffd\"" Oct 2 18:51:17.299259 env[1731]: time="2023-10-02T18:51:17.299209463Z" level=info msg="StartContainer for \"4920a5b675f302dec109f88862eb59181aeba083188850df81200280b5105ffd\"" Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.313000 audit: BPF prog-id=155 op=LOAD Oct 2 18:51:17.315000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.315000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4215 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623066623233333737383133333566653133626533653462336362 Oct 2 18:51:17.315000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.315000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4215 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623066623233333737383133333566653133626533653462336362 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.316000 audit: BPF prog-id=156 op=LOAD Oct 2 18:51:17.316000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4215 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623066623233333737383133333566653133626533653462336362 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.317000 audit: BPF prog-id=157 op=LOAD Oct 2 18:51:17.317000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4215 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623066623233333737383133333566653133626533653462336362 Oct 2 18:51:17.318000 audit: BPF prog-id=157 op=UNLOAD Oct 2 18:51:17.318000 audit: BPF prog-id=156 op=UNLOAD Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.318000 audit: BPF prog-id=158 op=LOAD Oct 2 18:51:17.318000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4215 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623066623233333737383133333566653133626533653462336362 Oct 2 18:51:17.352507 systemd[1]: Started cri-containerd-4920a5b675f302dec109f88862eb59181aeba083188850df81200280b5105ffd.scope. Oct 2 18:51:17.408794 env[1731]: time="2023-10-02T18:51:17.408735039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-j75ns,Uid:665089a4-40c2-46ec-aa3b-93c7551b8968,Namespace:calico-system,Attempt:1,} returns sandbox id \"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555\"" Oct 2 18:51:17.412422 env[1731]: time="2023-10-02T18:51:17.412362561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.422000 audit: BPF prog-id=159 op=LOAD Oct 2 18:51:17.423000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.423000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4167 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323061356236373566333032646563313039663838383632656235 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4167 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323061356236373566333032646563313039663838383632656235 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.424000 audit: BPF prog-id=160 op=LOAD Oct 2 18:51:17.424000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4167 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323061356236373566333032646563313039663838383632656235 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.426000 audit: BPF prog-id=161 op=LOAD Oct 2 18:51:17.426000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4167 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323061356236373566333032646563313039663838383632656235 Oct 2 18:51:17.428000 audit: BPF prog-id=161 op=UNLOAD Oct 2 18:51:17.428000 audit: BPF prog-id=160 op=UNLOAD Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:17.428000 audit: BPF prog-id=162 op=LOAD Oct 2 18:51:17.428000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4167 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323061356236373566333032646563313039663838383632656235 Oct 2 18:51:17.474904 env[1731]: time="2023-10-02T18:51:17.474805938Z" level=info msg="StartContainer for \"4920a5b675f302dec109f88862eb59181aeba083188850df81200280b5105ffd\" returns successfully" Oct 2 18:51:17.600000 audit[4299]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:17.600000 audit[4299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd929b510 a2=0 a3=ffffb53c96c0 items=0 ppid=3028 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.600000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:17.602000 audit[4299]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:17.602000 audit[4299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffd929b510 a2=0 a3=ffffb53c96c0 items=0 ppid=3028 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:18.454304 systemd-networkd[1540]: cali293f3e7cd69: Gained IPv6LL Oct 2 18:51:18.570114 kubelet[2850]: I1002 18:51:18.570053 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-qcnqm" podStartSLOduration=36.569999618 podCreationTimestamp="2023-10-02 18:50:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:51:17.5739529 +0000 UTC m=+48.759989473" watchObservedRunningTime="2023-10-02 18:51:18.569999618 +0000 UTC m=+49.756036167" Oct 2 18:51:18.601000 audit[4309]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:18.601000 audit[4309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc9d774a0 a2=0 a3=ffffa4dfe6c0 items=0 ppid=3028 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:18.606000 audit[4309]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:18.606000 audit[4309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffc9d774a0 a2=0 a3=ffffa4dfe6c0 items=0 ppid=3028 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:18.737274 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1541494409.mount: Deactivated successfully. Oct 2 18:51:18.840394 systemd-networkd[1540]: cali85968f78c4d: Gained IPv6LL Oct 2 18:51:19.240755 env[1731]: time="2023-10-02T18:51:19.240703114Z" level=info msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.360 [INFO][4327] k8s.go 576: Cleaning up netns ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.362 [INFO][4327] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" iface="eth0" netns="/var/run/netns/cni-2aba6cde-424a-1330-d830-7b1f88ee669d" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.362 [INFO][4327] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" iface="eth0" netns="/var/run/netns/cni-2aba6cde-424a-1330-d830-7b1f88ee669d" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.363 [INFO][4327] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" iface="eth0" netns="/var/run/netns/cni-2aba6cde-424a-1330-d830-7b1f88ee669d" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.363 [INFO][4327] k8s.go 583: Releasing IP address(es) ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.363 [INFO][4327] utils.go 196: Calico CNI releasing IP address ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.424 [INFO][4333] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.448670 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:19.448670 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.441 [WARNING][4333] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.441 [INFO][4333] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.448670 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:19.448670 env[1731]: 2023-10-02 18:51:19.446 [INFO][4327] k8s.go 589: Teardown processing complete. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:19.452925 systemd[1]: run-netns-cni\x2d2aba6cde\x2d424a\x2d1330\x2dd830\x2d7b1f88ee669d.mount: Deactivated successfully. Oct 2 18:51:19.462963 env[1731]: time="2023-10-02T18:51:19.462894164Z" level=info msg="TearDown network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" successfully" Oct 2 18:51:19.465068 env[1731]: time="2023-10-02T18:51:19.463118115Z" level=info msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" returns successfully" Oct 2 18:51:19.465068 env[1731]: time="2023-10-02T18:51:19.464208772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-njdxr,Uid:93421757-6fcc-487a-a737-db1cd9384428,Namespace:kube-system,Attempt:1,}" Oct 2 18:51:19.851550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:51:19.851745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2f8caeb8cc5: link becomes ready Oct 2 18:51:19.861878 systemd-networkd[1540]: cali2f8caeb8cc5: Link UP Oct 2 18:51:19.861892 systemd-networkd[1540]: cali2f8caeb8cc5: Gained carrier Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.639 [INFO][4339] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0 coredns-5d78c9869d- kube-system 93421757-6fcc-487a-a737-db1cd9384428 725 0 2023-10-02 18:50:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-180 coredns-5d78c9869d-njdxr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2f8caeb8cc5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.639 [INFO][4339] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.765 [INFO][4352] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" HandleID="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.797 [INFO][4352] ipam_plugin.go 269: Auto assigning IP ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" HandleID="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d860), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-180", "pod":"coredns-5d78c9869d-njdxr", "timestamp":"2023-10-02 18:51:19.765079405 +0000 UTC"}, Hostname:"ip-172-31-28-180", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:19.908796 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:19.908796 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.798 [INFO][4352] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-180' Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.801 [INFO][4352] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.808 [INFO][4352] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.815 [INFO][4352] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.819 [INFO][4352] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.823 [INFO][4352] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.823 [INFO][4352] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.825 [INFO][4352] ipam.go 1682: Creating new handle: k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.831 [INFO][4352] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.840 [INFO][4352] ipam.go 1216: Successfully claimed IPs: [192.168.4.67/26] block=192.168.4.64/26 handle="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.841 [INFO][4352] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.67/26] handle="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" host="ip-172-31-28-180" Oct 2 18:51:19.908796 env[1731]: time="2023-10-02T18:51:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:19.908796 env[1731]: 2023-10-02 18:51:19.841 [INFO][4352] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.4.67/26] IPv6=[] ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" HandleID="k8s-pod-network.17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.844 [INFO][4339] k8s.go 383: Populated endpoint ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"93421757-6fcc-487a-a737-db1cd9384428", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"", Pod:"coredns-5d78c9869d-njdxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f8caeb8cc5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.844 [INFO][4339] k8s.go 384: Calico CNI using IPs: [192.168.4.67/32] ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.844 [INFO][4339] dataplane_linux.go 68: Setting the host side veth name to cali2f8caeb8cc5 ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.852 [INFO][4339] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.864 [INFO][4339] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"93421757-6fcc-487a-a737-db1cd9384428", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c", Pod:"coredns-5d78c9869d-njdxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f8caeb8cc5", MAC:"2a:de:fb:87:7d:87", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:19.911349 env[1731]: 2023-10-02 18:51:19.901 [INFO][4339] k8s.go 489: Wrote updated endpoint to datastore ContainerID="17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c" Namespace="kube-system" Pod="coredns-5d78c9869d-njdxr" WorkloadEndpoint="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:20.040606 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.x1nEeO.mount: Deactivated successfully. Oct 2 18:51:20.069531 env[1731]: time="2023-10-02T18:51:20.069426545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:20.069814 env[1731]: time="2023-10-02T18:51:20.069766438Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:20.070017 env[1731]: time="2023-10-02T18:51:20.069956610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:20.070523 env[1731]: time="2023-10-02T18:51:20.070469024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c pid=4383 runtime=io.containerd.runc.v2 Oct 2 18:51:20.140000 audit[4398]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:20.140000 audit[4398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20752 a0=3 a1=ffffc0070320 a2=0 a3=ffffadec5fa0 items=0 ppid=3867 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.140000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:20.168442 systemd[1]: Started cri-containerd-17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c.scope. Oct 2 18:51:20.182577 systemd[1]: run-containerd-runc-k8s.io-17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c-runc.0IXywZ.mount: Deactivated successfully. Oct 2 18:51:20.239206 env[1731]: time="2023-10-02T18:51:20.239152032Z" level=info msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.244000 audit: BPF prog-id=163 op=LOAD Oct 2 18:51:20.246000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.246000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4383 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653261373963353935383536313034313930636530326430633635 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4383 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653261373963353935383536313034313930636530326430633635 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.247000 audit: BPF prog-id=164 op=LOAD Oct 2 18:51:20.247000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4383 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653261373963353935383536313034313930636530326430633635 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.250000 audit: BPF prog-id=165 op=LOAD Oct 2 18:51:20.250000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4383 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653261373963353935383536313034313930636530326430633635 Oct 2 18:51:20.252000 audit: BPF prog-id=165 op=UNLOAD Oct 2 18:51:20.252000 audit: BPF prog-id=164 op=UNLOAD Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.252000 audit: BPF prog-id=166 op=LOAD Oct 2 18:51:20.252000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4383 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653261373963353935383536313034313930636530326430633635 Oct 2 18:51:20.367659 env[1731]: time="2023-10-02T18:51:20.367598985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-njdxr,Uid:93421757-6fcc-487a-a737-db1cd9384428,Namespace:kube-system,Attempt:1,} returns sandbox id \"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c\"" Oct 2 18:51:20.373386 env[1731]: time="2023-10-02T18:51:20.373331076Z" level=info msg="CreateContainer within sandbox \"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:51:20.408540 env[1731]: time="2023-10-02T18:51:20.406413166Z" level=info msg="CreateContainer within sandbox \"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"435e23547512b3a6b0649288765bb1e770f3711c7ae503f015a6b1389e61f091\"" Oct 2 18:51:20.413505 env[1731]: time="2023-10-02T18:51:20.413451310Z" level=info msg="StartContainer for \"435e23547512b3a6b0649288765bb1e770f3711c7ae503f015a6b1389e61f091\"" Oct 2 18:51:20.527767 systemd[1]: Started cri-containerd-435e23547512b3a6b0649288765bb1e770f3711c7ae503f015a6b1389e61f091.scope. Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.639000 audit: BPF prog-id=167 op=LOAD Oct 2 18:51:20.640000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.640000 audit[4457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4383 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356532333534373531326233613662303634393238383736356262 Oct 2 18:51:20.640000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.640000 audit[4457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4383 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356532333534373531326233613662303634393238383736356262 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit: BPF prog-id=168 op=LOAD Oct 2 18:51:20.642000 audit[4457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4383 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356532333534373531326233613662303634393238383736356262 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit: BPF prog-id=169 op=LOAD Oct 2 18:51:20.642000 audit[4457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4383 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356532333534373531326233613662303634393238383736356262 Oct 2 18:51:20.642000 audit: BPF prog-id=169 op=UNLOAD Oct 2 18:51:20.642000 audit: BPF prog-id=168 op=UNLOAD Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:20.642000 audit: BPF prog-id=170 op=LOAD Oct 2 18:51:20.642000 audit[4457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4383 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:20.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356532333534373531326233613662303634393238383736356262 Oct 2 18:51:20.775074 env[1731]: time="2023-10-02T18:51:20.775002654Z" level=info msg="StartContainer for \"435e23547512b3a6b0649288765bb1e770f3711c7ae503f015a6b1389e61f091\" returns successfully" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.593 [INFO][4440] k8s.go 576: Cleaning up netns ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.594 [INFO][4440] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" iface="eth0" netns="/var/run/netns/cni-a753a293-9aaa-fc21-167e-b8633ca33175" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.597 [INFO][4440] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" iface="eth0" netns="/var/run/netns/cni-a753a293-9aaa-fc21-167e-b8633ca33175" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.598 [INFO][4440] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" iface="eth0" netns="/var/run/netns/cni-a753a293-9aaa-fc21-167e-b8633ca33175" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.598 [INFO][4440] k8s.go 583: Releasing IP address(es) ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.599 [INFO][4440] utils.go 196: Calico CNI releasing IP address ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.754 [INFO][4470] ipam_plugin.go 416: Releasing address using handleID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:20.804709 env[1731]: time="2023-10-02T18:51:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:20.804709 env[1731]: time="2023-10-02T18:51:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.788 [WARNING][4470] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.788 [INFO][4470] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:20.804709 env[1731]: time="2023-10-02T18:51:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:20.804709 env[1731]: 2023-10-02 18:51:20.800 [INFO][4440] k8s.go 589: Teardown processing complete. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:20.805979 env[1731]: time="2023-10-02T18:51:20.805926203Z" level=info msg="TearDown network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" successfully" Oct 2 18:51:20.806128 env[1731]: time="2023-10-02T18:51:20.806092652Z" level=info msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" returns successfully" Oct 2 18:51:20.808714 env[1731]: time="2023-10-02T18:51:20.808656100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkt5t,Uid:00e2fb11-591a-4ca5-a0b8-307db6198bfb,Namespace:calico-system,Attempt:1,}" Oct 2 18:51:21.035782 systemd[1]: run-netns-cni\x2da753a293\x2d9aaa\x2dfc21\x2d167e\x2db8633ca33175.mount: Deactivated successfully. Oct 2 18:51:21.338213 systemd-networkd[1540]: cali59a5c92c420: Link UP Oct 2 18:51:21.343710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali59a5c92c420: link becomes ready Oct 2 18:51:21.343276 systemd-networkd[1540]: cali59a5c92c420: Gained carrier Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.030 [INFO][4492] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0 csi-node-driver- calico-system 00e2fb11-591a-4ca5-a0b8-307db6198bfb 735 0 2023-10-02 18:51:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-28-180 csi-node-driver-jkt5t eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali59a5c92c420 [] []}} ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.031 [INFO][4492] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.190 [INFO][4509] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" HandleID="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.223 [INFO][4509] ipam_plugin.go 269: Auto assigning IP ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" HandleID="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d2c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-180", "pod":"csi-node-driver-jkt5t", "timestamp":"2023-10-02 18:51:21.190231973 +0000 UTC"}, Hostname:"ip-172-31-28-180", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:21.382683 env[1731]: time="2023-10-02T18:51:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:21.382683 env[1731]: time="2023-10-02T18:51:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.223 [INFO][4509] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-180' Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.231 [INFO][4509] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.244 [INFO][4509] ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.257 [INFO][4509] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.263 [INFO][4509] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.272 [INFO][4509] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.272 [INFO][4509] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.278 [INFO][4509] ipam.go 1682: Creating new handle: k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7 Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.286 [INFO][4509] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.306 [INFO][4509] ipam.go 1216: Successfully claimed IPs: [192.168.4.68/26] block=192.168.4.64/26 handle="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.307 [INFO][4509] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.68/26] handle="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" host="ip-172-31-28-180" Oct 2 18:51:21.382683 env[1731]: time="2023-10-02T18:51:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:21.382683 env[1731]: 2023-10-02 18:51:21.307 [INFO][4509] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.4.68/26] IPv6=[] ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" HandleID="k8s-pod-network.ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.316 [INFO][4492] k8s.go 383: Populated endpoint ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00e2fb11-591a-4ca5-a0b8-307db6198bfb", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"", Pod:"csi-node-driver-jkt5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59a5c92c420", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.316 [INFO][4492] k8s.go 384: Calico CNI using IPs: [192.168.4.68/32] ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.316 [INFO][4492] dataplane_linux.go 68: Setting the host side veth name to cali59a5c92c420 ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.318 [INFO][4492] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.352 [INFO][4492] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00e2fb11-591a-4ca5-a0b8-307db6198bfb", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7", Pod:"csi-node-driver-jkt5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59a5c92c420", MAC:"8a:7b:fa:79:94:67", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.385744 env[1731]: 2023-10-02 18:51:21.374 [INFO][4492] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7" Namespace="calico-system" Pod="csi-node-driver-jkt5t" WorkloadEndpoint="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:21.495234 env[1731]: time="2023-10-02T18:51:21.487700981Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:21.495234 env[1731]: time="2023-10-02T18:51:21.487863194Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:21.495234 env[1731]: time="2023-10-02T18:51:21.487893061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:21.495234 env[1731]: time="2023-10-02T18:51:21.488174648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7 pid=4537 runtime=io.containerd.runc.v2 Oct 2 18:51:21.582779 systemd[1]: run-containerd-runc-k8s.io-ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7-runc.I4BOUt.mount: Deactivated successfully. Oct 2 18:51:21.590038 systemd[1]: Started cri-containerd-ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7.scope. Oct 2 18:51:21.598000 audit[4557]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:21.598000 audit[4557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19492 a0=3 a1=ffffc21916d0 a2=0 a3=ffff8b2b3fa0 items=0 ppid=3867 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.598000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:21.657534 kubelet[2850]: I1002 18:51:21.657493 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-njdxr" podStartSLOduration=39.65733121 podCreationTimestamp="2023-10-02 18:50:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:51:21.657237216 +0000 UTC m=+52.843273849" watchObservedRunningTime="2023-10-02 18:51:21.65733121 +0000 UTC m=+52.843367759" Oct 2 18:51:21.684519 env[1731]: time="2023-10-02T18:51:21.684434987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:21.689432 env[1731]: time="2023-10-02T18:51:21.689343602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:21.694902 env[1731]: time="2023-10-02T18:51:21.694813266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:21.699714 env[1731]: time="2023-10-02T18:51:21.699636478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:21.718497 env[1731]: time="2023-10-02T18:51:21.718383554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 18:51:21.738349 env[1731]: time="2023-10-02T18:51:21.738264944Z" level=info msg="CreateContainer within sandbox \"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.745000 audit: BPF prog-id=171 op=LOAD Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4537 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383333636137343130653838663033646665306537653737303964 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4537 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383333636137343130653838663033646665306537653737303964 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.746000 audit: BPF prog-id=172 op=LOAD Oct 2 18:51:21.746000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4537 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383333636137343130653838663033646665306537653737303964 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.749000 audit: BPF prog-id=173 op=LOAD Oct 2 18:51:21.749000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4537 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383333636137343130653838663033646665306537653737303964 Oct 2 18:51:21.757000 audit: BPF prog-id=173 op=UNLOAD Oct 2 18:51:21.757000 audit: BPF prog-id=172 op=UNLOAD Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.757000 audit: BPF prog-id=174 op=LOAD Oct 2 18:51:21.757000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4537 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566383333636137343130653838663033646665306537653737303964 Oct 2 18:51:21.762601 env[1731]: time="2023-10-02T18:51:21.762136798Z" level=info msg="CreateContainer within sandbox \"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0\"" Oct 2 18:51:21.767166 env[1731]: time="2023-10-02T18:51:21.765888167Z" level=info msg="StartContainer for \"ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0\"" Oct 2 18:51:21.796000 audit[4572]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:21.796000 audit[4572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcc2174a0 a2=0 a3=ffff8dba86c0 items=0 ppid=3028 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:21.800000 audit[4572]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:21.800000 audit[4572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffcc2174a0 a2=0 a3=ffff8dba86c0 items=0 ppid=3028 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:21.845210 systemd[1]: Started cri-containerd-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0.scope. Oct 2 18:51:21.848195 systemd-networkd[1540]: cali2f8caeb8cc5: Gained IPv6LL Oct 2 18:51:21.876476 env[1731]: time="2023-10-02T18:51:21.876396527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkt5t,Uid:00e2fb11-591a-4ca5-a0b8-307db6198bfb,Namespace:calico-system,Attempt:1,} returns sandbox id \"ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7\"" Oct 2 18:51:21.884083 env[1731]: time="2023-10-02T18:51:21.883992515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:51:21.902000 audit[4591]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:21.902000 audit[4591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffec486f30 a2=0 a3=ffff8e70f6c0 items=0 ppid=3028 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:21.949000 audit[4591]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:21.949000 audit[4591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffec486f30 a2=0 a3=ffff8e70f6c0 items=0 ppid=3028 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.971000 audit: BPF prog-id=175 op=LOAD Oct 2 18:51:21.972000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.972000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4215 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561396130663266373037316361393234623265366265323835313261 Oct 2 18:51:21.972000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.972000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4215 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561396130663266373037316361393234623265366265323835313261 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.973000 audit: BPF prog-id=176 op=LOAD Oct 2 18:51:21.973000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4215 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561396130663266373037316361393234623265366265323835313261 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.975000 audit: BPF prog-id=177 op=LOAD Oct 2 18:51:21.975000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4215 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561396130663266373037316361393234623265366265323835313261 Oct 2 18:51:21.976000 audit: BPF prog-id=177 op=UNLOAD Oct 2 18:51:21.976000 audit: BPF prog-id=176 op=UNLOAD Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.976000 audit: BPF prog-id=178 op=LOAD Oct 2 18:51:21.976000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4215 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561396130663266373037316361393234623265366265323835313261 Oct 2 18:51:22.019476 env[1731]: time="2023-10-02T18:51:22.019395626Z" level=info msg="StartContainer for \"ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0\" returns successfully" Oct 2 18:51:22.058375 env[1731]: time="2023-10-02T18:51:22.058248564Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:22.059743 env[1731]: time="2023-10-02T18:51:22.059658203Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:22.060797 kubelet[2850]: E1002 18:51:22.060206 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:22.060797 kubelet[2850]: E1002 18:51:22.060297 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:22.061102 kubelet[2850]: E1002 18:51:22.060504 2850 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:22.062967 env[1731]: time="2023-10-02T18:51:22.062900186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:51:22.234966 env[1731]: time="2023-10-02T18:51:22.234876602Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:22.236398 env[1731]: time="2023-10-02T18:51:22.236275549Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:22.236969 kubelet[2850]: E1002 18:51:22.236916 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:22.237221 kubelet[2850]: E1002 18:51:22.237185 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:22.237991 kubelet[2850]: E1002 18:51:22.237956 2850 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:22.238458 kubelet[2850]: E1002 18:51:22.238409 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:22.634406 kubelet[2850]: E1002 18:51:22.632146 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:22.781724 kubelet[2850]: I1002 18:51:22.781648 2850 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-j75ns" podStartSLOduration=29.468569701 podCreationTimestamp="2023-10-02 18:50:49 +0000 UTC" firstStartedPulling="2023-10-02 18:51:17.411240253 +0000 UTC m=+48.597276802" lastFinishedPulling="2023-10-02 18:51:21.724257166 +0000 UTC m=+52.910293715" observedRunningTime="2023-10-02 18:51:22.74227286 +0000 UTC m=+53.928309433" watchObservedRunningTime="2023-10-02 18:51:22.781586614 +0000 UTC m=+53.967623187" Oct 2 18:51:22.806159 systemd-networkd[1540]: cali59a5c92c420: Gained IPv6LL Oct 2 18:51:23.629584 kubelet[2850]: E1002 18:51:23.629524 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:24.156000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.159548 kernel: kauditd_printk_skb: 425 callbacks suppressed Oct 2 18:51:24.159689 kernel: audit: type=1400 audit(1696272684.156:1334): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.156000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.178944 kernel: audit: type=1400 audit(1696272684.156:1333): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.179061 kernel: audit: type=1300 audit(1696272684.156:1333): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4003641230 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.156000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4003641230 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.201790 kernel: audit: type=1327 audit(1696272684.156:1333): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.156000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40047c75e0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.214212 kernel: audit: type=1300 audit(1696272684.156:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40047c75e0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.224973 kernel: audit: type=1327 audit(1696272684.156:1334): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.225108 kernel: audit: type=1400 audit(1696272684.164:1335): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6819 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.164000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6819 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.164000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009d1fe90 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.247175 kernel: audit: type=1300 audit(1696272684.164:1335): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009d1fe90 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.257993 kernel: audit: type=1327 audit(1696272684.164:1335): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.188000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.268107 kernel: audit: type=1400 audit(1696272684.188:1336): avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6834 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.188000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4000d50ea0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.218000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.218000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400848a1c0 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:24.219000 audit[2614]: AVC avc: denied { watch } for pid=2614 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:24.219000 audit[2614]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4003641680 a2=fc6 a3=0 items=0 ppid=2446 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c882 key=(null) Oct 2 18:51:24.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313830002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:51:25.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.180:22-139.178.89.65:45940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:25.234128 systemd[1]: Started sshd@7-172.31.28.180:22-139.178.89.65:45940.service. Oct 2 18:51:25.304000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:25.304000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c66560 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:25.304000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:25.304000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6832 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:25.304000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400135d920 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:25.304000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:25.421124 sshd[4665]: Accepted publickey for core from 139.178.89.65 port 45940 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:25.419000 audit[4665]: USER_ACCT pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.422000 audit[4665]: CRED_ACQ pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.422000 audit[4665]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed1aa2d0 a2=3 a3=1 items=0 ppid=1 pid=4665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:25.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:25.425443 sshd[4665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:25.434806 systemd[1]: Started session-8.scope. Oct 2 18:51:25.436531 systemd-logind[1723]: New session 8 of user core. Oct 2 18:51:25.444000 audit[4665]: USER_START pid=4665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.451000 audit[4667]: CRED_ACQ pid=4667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.754952 sshd[4665]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:25.755000 audit[4665]: USER_END pid=4665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.755000 audit[4665]: CRED_DISP pid=4665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:25.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.180:22-139.178.89.65:45940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:25.761382 systemd-logind[1723]: Session 8 logged out. Waiting for processes to exit. Oct 2 18:51:25.762007 systemd[1]: sshd@7-172.31.28.180:22-139.178.89.65:45940.service: Deactivated successfully. Oct 2 18:51:25.764070 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 18:51:25.766651 systemd-logind[1723]: Removed session 8. Oct 2 18:51:29.070829 env[1731]: time="2023-10-02T18:51:29.070767498Z" level=info msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.163 [WARNING][4691] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"665089a4-40c2-46ec-aa3b-93c7551b8968", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555", Pod:"calico-kube-controllers-7bd445fdb4-j75ns", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali293f3e7cd69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.164 [INFO][4691] k8s.go 576: Cleaning up netns ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.164 [INFO][4691] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" iface="eth0" netns="" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.164 [INFO][4691] k8s.go 583: Releasing IP address(es) ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.164 [INFO][4691] utils.go 196: Calico CNI releasing IP address ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.223 [INFO][4697] ipam_plugin.go 416: Releasing address using handleID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.250409 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:29.250409 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.241 [WARNING][4697] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.241 [INFO][4697] ipam_plugin.go 444: Releasing address using workloadID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.250409 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:29.250409 env[1731]: 2023-10-02 18:51:29.247 [INFO][4691] k8s.go 589: Teardown processing complete. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.251699 env[1731]: time="2023-10-02T18:51:29.251619657Z" level=info msg="TearDown network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" successfully" Oct 2 18:51:29.251929 env[1731]: time="2023-10-02T18:51:29.251894599Z" level=info msg="StopPodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" returns successfully" Oct 2 18:51:29.253423 env[1731]: time="2023-10-02T18:51:29.253284726Z" level=info msg="RemovePodSandbox for \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" Oct 2 18:51:29.253423 env[1731]: time="2023-10-02T18:51:29.253346705Z" level=info msg="Forcibly stopping sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\"" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.356 [WARNING][4715] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"665089a4-40c2-46ec-aa3b-93c7551b8968", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"e6b0fb2337781335fe13be3e4b3cb2782be2229911bbb00154c83b13a7ae8555", Pod:"calico-kube-controllers-7bd445fdb4-j75ns", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali293f3e7cd69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.358 [INFO][4715] k8s.go 576: Cleaning up netns ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.358 [INFO][4715] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" iface="eth0" netns="" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.358 [INFO][4715] k8s.go 583: Releasing IP address(es) ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.358 [INFO][4715] utils.go 196: Calico CNI releasing IP address ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.420 [INFO][4723] ipam_plugin.go 416: Releasing address using handleID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.444022 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:29.444022 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.435 [WARNING][4723] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.435 [INFO][4723] ipam_plugin.go 444: Releasing address using workloadID ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" HandleID="k8s-pod-network.77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Workload="ip--172--31--28--180-k8s-calico--kube--controllers--7bd445fdb4--j75ns-eth0" Oct 2 18:51:29.444022 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:29.444022 env[1731]: 2023-10-02 18:51:29.441 [INFO][4715] k8s.go 589: Teardown processing complete. ContainerID="77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b" Oct 2 18:51:29.445474 env[1731]: time="2023-10-02T18:51:29.445410744Z" level=info msg="TearDown network for sandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" successfully" Oct 2 18:51:29.452072 env[1731]: time="2023-10-02T18:51:29.451989982Z" level=info msg="RemovePodSandbox \"77bcb306cb4b57e1bf64baeaa1872ef1a5d2f8ee4e7729bf4c8dc582d1aef04b\" returns successfully" Oct 2 18:51:29.453247 env[1731]: time="2023-10-02T18:51:29.453145583Z" level=info msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.551 [WARNING][4741] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00e2fb11-591a-4ca5-a0b8-307db6198bfb", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7", Pod:"csi-node-driver-jkt5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59a5c92c420", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.552 [INFO][4741] k8s.go 576: Cleaning up netns ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.552 [INFO][4741] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" iface="eth0" netns="" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.552 [INFO][4741] k8s.go 583: Releasing IP address(es) ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.552 [INFO][4741] utils.go 196: Calico CNI releasing IP address ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.620 [INFO][4748] ipam_plugin.go 416: Releasing address using handleID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.641026 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:29.641026 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.634 [WARNING][4748] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.634 [INFO][4748] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.641026 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:29.641026 env[1731]: 2023-10-02 18:51:29.638 [INFO][4741] k8s.go 589: Teardown processing complete. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.642649 env[1731]: time="2023-10-02T18:51:29.642575670Z" level=info msg="TearDown network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" successfully" Oct 2 18:51:29.642649 env[1731]: time="2023-10-02T18:51:29.642635826Z" level=info msg="StopPodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" returns successfully" Oct 2 18:51:29.643401 env[1731]: time="2023-10-02T18:51:29.643343327Z" level=info msg="RemovePodSandbox for \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" Oct 2 18:51:29.643553 env[1731]: time="2023-10-02T18:51:29.643401239Z" level=info msg="Forcibly stopping sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\"" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.746 [WARNING][4770] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00e2fb11-591a-4ca5-a0b8-307db6198bfb", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"ef833ca7410e88f03dfe0e7e7709dede795f002f4f82c89e59118b39e24eacb7", Pod:"csi-node-driver-jkt5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59a5c92c420", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.747 [INFO][4770] k8s.go 576: Cleaning up netns ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.747 [INFO][4770] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" iface="eth0" netns="" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.747 [INFO][4770] k8s.go 583: Releasing IP address(es) ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.747 [INFO][4770] utils.go 196: Calico CNI releasing IP address ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.807 [INFO][4776] ipam_plugin.go 416: Releasing address using handleID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.861068 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:29.861068 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.844 [WARNING][4776] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.844 [INFO][4776] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" HandleID="k8s-pod-network.3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Workload="ip--172--31--28--180-k8s-csi--node--driver--jkt5t-eth0" Oct 2 18:51:29.861068 env[1731]: time="2023-10-02T18:51:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:29.861068 env[1731]: 2023-10-02 18:51:29.857 [INFO][4770] k8s.go 589: Teardown processing complete. ContainerID="3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81" Oct 2 18:51:29.863260 env[1731]: time="2023-10-02T18:51:29.863206162Z" level=info msg="TearDown network for sandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" successfully" Oct 2 18:51:29.869815 env[1731]: time="2023-10-02T18:51:29.869689150Z" level=info msg="RemovePodSandbox \"3949d0566d84e38da0817359e4895a62fa8a5a0fb98cba6120d472b3356dff81\" returns successfully" Oct 2 18:51:29.870712 env[1731]: time="2023-10-02T18:51:29.870665628Z" level=info msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" Oct 2 18:51:30.024103 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.p2Qm11.mount: Deactivated successfully. Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:29.973 [WARNING][4795] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8e2ab800-7d23-4d37-b6ef-e38063f4389c", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65", Pod:"coredns-5d78c9869d-qcnqm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali85968f78c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:29.975 [INFO][4795] k8s.go 576: Cleaning up netns ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:29.975 [INFO][4795] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" iface="eth0" netns="" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:29.975 [INFO][4795] k8s.go 583: Releasing IP address(es) ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:29.975 [INFO][4795] utils.go 196: Calico CNI releasing IP address ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:30.053 [INFO][4802] ipam_plugin.go 416: Releasing address using handleID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.085834 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:30.085834 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:30.069 [WARNING][4802] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:30.069 [INFO][4802] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.085834 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:30.085834 env[1731]: 2023-10-02 18:51:30.082 [INFO][4795] k8s.go 589: Teardown processing complete. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.087537 env[1731]: time="2023-10-02T18:51:30.087481878Z" level=info msg="TearDown network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" successfully" Oct 2 18:51:30.087718 env[1731]: time="2023-10-02T18:51:30.087683501Z" level=info msg="StopPodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" returns successfully" Oct 2 18:51:30.091916 env[1731]: time="2023-10-02T18:51:30.091864746Z" level=info msg="RemovePodSandbox for \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" Oct 2 18:51:30.092225 env[1731]: time="2023-10-02T18:51:30.092133172Z" level=info msg="Forcibly stopping sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\"" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.212 [WARNING][4837] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8e2ab800-7d23-4d37-b6ef-e38063f4389c", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"2c2462b7126bc05310ea7d4e3d4c52a2f7b32a0178fa72560976bc6875568d65", Pod:"coredns-5d78c9869d-qcnqm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali85968f78c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.213 [INFO][4837] k8s.go 576: Cleaning up netns ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.214 [INFO][4837] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" iface="eth0" netns="" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.214 [INFO][4837] k8s.go 583: Releasing IP address(es) ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.214 [INFO][4837] utils.go 196: Calico CNI releasing IP address ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.288 [INFO][4852] ipam_plugin.go 416: Releasing address using handleID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.324225 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:30.324225 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.312 [WARNING][4852] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.312 [INFO][4852] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" HandleID="k8s-pod-network.6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--qcnqm-eth0" Oct 2 18:51:30.324225 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:30.324225 env[1731]: 2023-10-02 18:51:30.321 [INFO][4837] k8s.go 589: Teardown processing complete. ContainerID="6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272" Oct 2 18:51:30.325405 env[1731]: time="2023-10-02T18:51:30.325347385Z" level=info msg="TearDown network for sandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" successfully" Oct 2 18:51:30.334053 env[1731]: time="2023-10-02T18:51:30.333992114Z" level=info msg="RemovePodSandbox \"6be77e1999c36d62ed5c9b1edcb9a2db72d71957fa4e4fad1162482e79029272\" returns successfully" Oct 2 18:51:30.335111 env[1731]: time="2023-10-02T18:51:30.335058569Z" level=info msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.430 [WARNING][4872] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"93421757-6fcc-487a-a737-db1cd9384428", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c", Pod:"coredns-5d78c9869d-njdxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f8caeb8cc5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.431 [INFO][4872] k8s.go 576: Cleaning up netns ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.431 [INFO][4872] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" iface="eth0" netns="" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.432 [INFO][4872] k8s.go 583: Releasing IP address(es) ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.432 [INFO][4872] utils.go 196: Calico CNI releasing IP address ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.486 [INFO][4878] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.508319 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:30.508319 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.501 [WARNING][4878] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.501 [INFO][4878] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.508319 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:30.508319 env[1731]: 2023-10-02 18:51:30.505 [INFO][4872] k8s.go 589: Teardown processing complete. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.509292 env[1731]: time="2023-10-02T18:51:30.508353211Z" level=info msg="TearDown network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" successfully" Oct 2 18:51:30.509292 env[1731]: time="2023-10-02T18:51:30.508397767Z" level=info msg="StopPodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" returns successfully" Oct 2 18:51:30.509292 env[1731]: time="2023-10-02T18:51:30.509022374Z" level=info msg="RemovePodSandbox for \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" Oct 2 18:51:30.509292 env[1731]: time="2023-10-02T18:51:30.509070110Z" level=info msg="Forcibly stopping sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\"" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.610 [WARNING][4897] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"93421757-6fcc-487a-a737-db1cd9384428", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-180", ContainerID:"17e2a79c595856104190ce02d0c652537b5cd57fefcf607cc49eb19c8ebd0f7c", Pod:"coredns-5d78c9869d-njdxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f8caeb8cc5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.610 [INFO][4897] k8s.go 576: Cleaning up netns ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.610 [INFO][4897] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" iface="eth0" netns="" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.611 [INFO][4897] k8s.go 583: Releasing IP address(es) ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.611 [INFO][4897] utils.go 196: Calico CNI releasing IP address ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.693 [INFO][4903] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.716115 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:30.716115 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.709 [WARNING][4903] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.709 [INFO][4903] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" HandleID="k8s-pod-network.2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Workload="ip--172--31--28--180-k8s-coredns--5d78c9869d--njdxr-eth0" Oct 2 18:51:30.716115 env[1731]: time="2023-10-02T18:51:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:30.716115 env[1731]: 2023-10-02 18:51:30.713 [INFO][4897] k8s.go 589: Teardown processing complete. ContainerID="2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158" Oct 2 18:51:30.717055 env[1731]: time="2023-10-02T18:51:30.716149560Z" level=info msg="TearDown network for sandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" successfully" Oct 2 18:51:30.721063 env[1731]: time="2023-10-02T18:51:30.720973148Z" level=info msg="RemovePodSandbox \"2e7a2701f885a3975a4bdd56384a21da043a057ff8c63c8a0dace5ec59f61158\" returns successfully" Oct 2 18:51:31.645000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.648865 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 18:51:31.648949 kernel: audit: type=1400 audit(1696272691.645:1350): avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.646000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.668134 kernel: audit: type=1400 audit(1696272691.646:1351): avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.668273 kernel: audit: type=1300 audit(1696272691.646:1351): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001341460 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.646000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001341460 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.691594 kernel: audit: type=1327 audit(1696272691.646:1351): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.691730 kernel: audit: type=1300 audit(1696272691.645:1350): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8ce0 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.645000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8ce0 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.715110 kernel: audit: type=1327 audit(1696272691.645:1350): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.715264 kernel: audit: type=1400 audit(1696272691.664:1352): avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.664000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.724985 kernel: audit: type=1300 audit(1696272691.664:1352): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8d00 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.664000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8d00 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.748008 kernel: audit: type=1327 audit(1696272691.664:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:31.664000 audit[2631]: AVC avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.757647 kernel: audit: type=1400 audit(1696272691.664:1353): avc: denied { watch } for pid=2631 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:31.664000 audit[2631]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8d20 a2=fc6 a3=0 items=0 ppid=2490 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c881,c980 key=(null) Oct 2 18:51:31.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:33.160430 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.iSvw5D.mount: Deactivated successfully. Oct 2 18:51:33.251999 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.AgfchP.mount: Deactivated successfully. Oct 2 18:51:35.240666 env[1731]: time="2023-10-02T18:51:35.240304199Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:51:35.434662 env[1731]: time="2023-10-02T18:51:35.434550007Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:35.436422 env[1731]: time="2023-10-02T18:51:35.436358461Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:35.436792 kubelet[2850]: E1002 18:51:35.436754 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:35.437375 kubelet[2850]: E1002 18:51:35.436823 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:35.437375 kubelet[2850]: E1002 18:51:35.436978 2850 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:35.439121 env[1731]: time="2023-10-02T18:51:35.439049631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:51:35.650495 env[1731]: time="2023-10-02T18:51:35.650295131Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:35.652266 env[1731]: time="2023-10-02T18:51:35.652094561Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:35.652725 kubelet[2850]: E1002 18:51:35.652677 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:35.652871 kubelet[2850]: E1002 18:51:35.652746 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:35.652946 kubelet[2850]: E1002 18:51:35.652907 2850 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:35.653143 kubelet[2850]: E1002 18:51:35.652993 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:35.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.180:22-139.178.89.65:51126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:35.786244 systemd[1]: Started sshd@8-172.31.28.180:22-139.178.89.65:51126.service. Oct 2 18:51:35.974000 audit[4949]: USER_ACCT pid=4949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:35.975940 sshd[4949]: Accepted publickey for core from 139.178.89.65 port 51126 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:35.977000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:35.977000 audit[4949]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffceb2d920 a2=3 a3=1 items=0 ppid=1 pid=4949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:35.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:35.979822 sshd[4949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:35.989454 systemd[1]: Started session-9.scope. Oct 2 18:51:35.990281 systemd-logind[1723]: New session 9 of user core. Oct 2 18:51:35.999000 audit[4949]: USER_START pid=4949 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:36.006000 audit[4951]: CRED_ACQ pid=4951 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:36.271888 sshd[4949]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:36.273000 audit[4949]: USER_END pid=4949 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:36.274000 audit[4949]: CRED_DISP pid=4949 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:36.278242 systemd-logind[1723]: Session 9 logged out. Waiting for processes to exit. Oct 2 18:51:36.278423 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 18:51:36.280231 systemd[1]: sshd@8-172.31.28.180:22-139.178.89.65:51126.service: Deactivated successfully. Oct 2 18:51:36.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.180:22-139.178.89.65:51126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:36.282691 systemd-logind[1723]: Removed session 9. Oct 2 18:51:39.996505 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.21pPkp.mount: Deactivated successfully. Oct 2 18:51:43.159273 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.51tcvC.mount: Deactivated successfully. Oct 2 18:51:43.233425 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.BzXDJo.mount: Deactivated successfully. Oct 2 18:51:46.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.180:22-139.178.89.65:52958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:46.303964 systemd[1]: Started sshd@9-172.31.28.180:22-139.178.89.65:52958.service. Oct 2 18:51:46.306366 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 18:51:46.306473 kernel: audit: type=1130 audit(1696272706.303:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.180:22-139.178.89.65:52958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:46.492000 audit[5039]: USER_ACCT pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.497628 sshd[5039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:46.498789 sshd[5039]: Accepted publickey for core from 139.178.89.65 port 52958 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:46.496000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.513174 systemd[1]: Started session-10.scope. Oct 2 18:51:46.514144 kernel: audit: type=1101 audit(1696272706.492:1364): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.514211 kernel: audit: type=1103 audit(1696272706.496:1365): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.515241 systemd-logind[1723]: New session 10 of user core. Oct 2 18:51:46.521262 kernel: audit: type=1006 audit(1696272706.496:1366): pid=5039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 18:51:46.496000 audit[5039]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0bf7a60 a2=3 a3=1 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:46.532370 kernel: audit: type=1300 audit(1696272706.496:1366): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0bf7a60 a2=3 a3=1 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:46.540714 kernel: audit: type=1327 audit(1696272706.496:1366): proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:46.540834 kernel: audit: type=1105 audit(1696272706.534:1367): pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.496000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:46.534000 audit[5039]: USER_START pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.541000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.558356 kernel: audit: type=1103 audit(1696272706.541:1368): pid=5041 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.813199 sshd[5039]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:46.814000 audit[5039]: USER_END pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.820283 systemd-logind[1723]: Session 10 logged out. Waiting for processes to exit. Oct 2 18:51:46.822708 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 18:51:46.824822 systemd-logind[1723]: Removed session 10. Oct 2 18:51:46.826153 systemd[1]: sshd@9-172.31.28.180:22-139.178.89.65:52958.service: Deactivated successfully. Oct 2 18:51:46.816000 audit[5039]: CRED_DISP pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.836668 kernel: audit: type=1106 audit(1696272706.814:1369): pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.836831 kernel: audit: type=1104 audit(1696272706.816:1370): pid=5039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:46.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.180:22-139.178.89.65:52958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:46.850232 systemd[1]: Started sshd@10-172.31.28.180:22-139.178.89.65:52974.service. Oct 2 18:51:46.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.180:22-139.178.89.65:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:47.028000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:47.030110 sshd[5051]: Accepted publickey for core from 139.178.89.65 port 52974 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:47.031000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:47.032000 audit[5051]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9ec6430 a2=3 a3=1 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:47.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:47.034035 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:47.042559 systemd-logind[1723]: New session 11 of user core. Oct 2 18:51:47.043643 systemd[1]: Started session-11.scope. Oct 2 18:51:47.054000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:47.060000 audit[5053]: CRED_ACQ pid=5053 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:47.254486 kubelet[2850]: E1002 18:51:47.254451 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:48.973232 sshd[5051]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:48.975000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:48.975000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:48.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.180:22-139.178.89.65:52974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:48.979935 systemd-logind[1723]: Session 11 logged out. Waiting for processes to exit. Oct 2 18:51:48.980332 systemd[1]: sshd@10-172.31.28.180:22-139.178.89.65:52974.service: Deactivated successfully. Oct 2 18:51:48.981763 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 18:51:48.985797 systemd-logind[1723]: Removed session 11. Oct 2 18:51:49.008382 systemd[1]: Started sshd@11-172.31.28.180:22-139.178.89.65:52978.service. Oct 2 18:51:49.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.180:22-139.178.89.65:52978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:49.205000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.207112 sshd[5062]: Accepted publickey for core from 139.178.89.65 port 52978 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:49.208000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.208000 audit[5062]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd27fabd0 a2=3 a3=1 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:49.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:49.210449 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:49.222214 systemd-logind[1723]: New session 12 of user core. Oct 2 18:51:49.225312 systemd[1]: Started session-12.scope. Oct 2 18:51:49.239000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.246000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.531713 sshd[5062]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:49.532000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.533000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:49.540301 systemd[1]: sshd@11-172.31.28.180:22-139.178.89.65:52978.service: Deactivated successfully. Oct 2 18:51:49.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.180:22-139.178.89.65:52978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:49.541668 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 18:51:49.544029 systemd-logind[1723]: Session 12 logged out. Waiting for processes to exit. Oct 2 18:51:49.547781 systemd-logind[1723]: Removed session 12. Oct 2 18:51:59.240644 env[1731]: time="2023-10-02T18:51:59.240314280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:51:59.462786 env[1731]: time="2023-10-02T18:51:59.462647751Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:59.464517 env[1731]: time="2023-10-02T18:51:59.464412262Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:59.464968 kubelet[2850]: E1002 18:51:59.464901 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:59.465577 kubelet[2850]: E1002 18:51:59.464974 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:59.465577 kubelet[2850]: E1002 18:51:59.465542 2850 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:59.467734 env[1731]: time="2023-10-02T18:51:59.467343187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:51:59.574504 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 18:51:59.574679 kernel: audit: type=1130 audit(1696272719.561:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.180:22-139.178.89.65:43456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:59.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.180:22-139.178.89.65:43456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:59.562089 systemd[1]: Started sshd@12-172.31.28.180:22-139.178.89.65:43456.service. Oct 2 18:51:59.657947 env[1731]: time="2023-10-02T18:51:59.656735162Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:59.660624 env[1731]: time="2023-10-02T18:51:59.660543668Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:59.661165 kubelet[2850]: E1002 18:51:59.661123 2850 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:59.661338 kubelet[2850]: E1002 18:51:59.661193 2850 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:59.661338 kubelet[2850]: E1002 18:51:59.661326 2850 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4b47g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-jkt5t_calico-system(00e2fb11-591a-4ca5-a0b8-307db6198bfb): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:59.661569 kubelet[2850]: E1002 18:51:59.661413 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:51:59.743000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.748466 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:59.753295 sshd[5135]: Accepted publickey for core from 139.178.89.65 port 43456 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:59.746000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.765501 kernel: audit: type=1101 audit(1696272719.743:1391): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.765829 kernel: audit: type=1103 audit(1696272719.746:1392): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.773321 kernel: audit: type=1006 audit(1696272719.746:1393): pid=5135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 18:51:59.773422 kernel: audit: type=1300 audit(1696272719.746:1393): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf173490 a2=3 a3=1 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:59.746000 audit[5135]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf173490 a2=3 a3=1 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:59.771456 systemd[1]: Started session-13.scope. Oct 2 18:51:59.772601 systemd-logind[1723]: New session 13 of user core. Oct 2 18:51:59.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:59.788926 kernel: audit: type=1327 audit(1696272719.746:1393): proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:59.786000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.808050 kernel: audit: type=1105 audit(1696272719.786:1394): pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.808261 kernel: audit: type=1103 audit(1696272719.794:1395): pid=5137 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:59.794000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:00.020431 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.AhPqp8.mount: Deactivated successfully. Oct 2 18:52:00.130204 sshd[5135]: pam_unix(sshd:session): session closed for user core Oct 2 18:52:00.131000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:00.131000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:00.148743 systemd-logind[1723]: Session 13 logged out. Waiting for processes to exit. Oct 2 18:52:00.149999 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 18:52:00.151247 systemd[1]: sshd@12-172.31.28.180:22-139.178.89.65:43456.service: Deactivated successfully. Oct 2 18:52:00.154455 systemd-logind[1723]: Removed session 13. Oct 2 18:52:00.155707 kernel: audit: type=1106 audit(1696272720.131:1396): pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:00.155971 kernel: audit: type=1104 audit(1696272720.131:1397): pid=5135 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:00.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.180:22-139.178.89.65:43456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:52:03.166172 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.aMuQmX.mount: Deactivated successfully. Oct 2 18:52:10.003149 systemd[1]: run-containerd-runc-k8s.io-10bb9319bd24ec2377bfe078add9806c22f08d10be04ac491323ae08c85ab064-runc.fJLCu8.mount: Deactivated successfully. Oct 2 18:52:11.240055 kubelet[2850]: E1002 18:52:11.239995 2850 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-jkt5t" podUID=00e2fb11-591a-4ca5-a0b8-307db6198bfb Oct 2 18:52:13.165104 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.ZJUPkl.mount: Deactivated successfully. Oct 2 18:52:13.729000 audit: BPF prog-id=123 op=UNLOAD Oct 2 18:52:13.730364 systemd[1]: cri-containerd-1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb.scope: Deactivated successfully. Oct 2 18:52:13.730997 systemd[1]: cri-containerd-1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb.scope: Consumed 5.135s CPU time. Oct 2 18:52:13.733011 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 18:52:13.733128 kernel: audit: type=1334 audit(1696272733.729:1399): prog-id=123 op=UNLOAD Oct 2 18:52:13.737000 audit: BPF prog-id=126 op=UNLOAD Oct 2 18:52:13.742890 kernel: audit: type=1334 audit(1696272733.737:1400): prog-id=126 op=UNLOAD Oct 2 18:52:13.802031 env[1731]: time="2023-10-02T18:52:13.801948876Z" level=info msg="shim disconnected" id=1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb Oct 2 18:52:13.802827 env[1731]: time="2023-10-02T18:52:13.802029038Z" level=warning msg="cleaning up after shim disconnected" id=1799fc200e6a31d8f05508c4e586d93e46b8c53c7998a85b90ee6198e13a92bb namespace=k8s.io Oct 2 18:52:13.802827 env[1731]: time="2023-10-02T18:52:13.802052618Z" level=info msg="cleaning up dead shim" Oct 2 18:52:13.831589 env[1731]: time="2023-10-02T18:52:13.831523308Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:52:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5283 runtime=io.containerd.runc.v2\n" Oct 2 18:52:14.152749 systemd[1]: run-containerd-runc-k8s.io-ea9a0f2f7071ca924b2e6be28512a12145a9d3c0803babb163f10626306acac0-runc.19gXXv.mount: Deactivated successfully.