Oct 2 18:49:20.189763 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Oct 2 18:49:20.189804 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 18:49:20.189827 kernel: efi: EFI v2.70 by EDK II Oct 2 18:49:20.189842 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71accf98 Oct 2 18:49:20.189856 kernel: ACPI: Early table checksum verification disabled Oct 2 18:49:20.189870 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Oct 2 18:49:20.189885 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Oct 2 18:49:20.189899 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 18:49:20.189913 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Oct 2 18:49:20.189928 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 18:49:20.189946 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Oct 2 18:49:20.189960 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Oct 2 18:49:20.189973 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Oct 2 18:49:20.189988 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 18:49:20.190004 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Oct 2 18:49:20.190023 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Oct 2 18:49:20.190037 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Oct 2 18:49:20.190052 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Oct 2 18:49:20.190366 kernel: printk: bootconsole [uart0] enabled Oct 2 18:49:20.190387 kernel: NUMA: Failed to initialise from firmware Oct 2 18:49:20.190592 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:49:20.190612 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Oct 2 18:49:20.190627 kernel: Zone ranges: Oct 2 18:49:20.190642 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Oct 2 18:49:20.190656 kernel: DMA32 empty Oct 2 18:49:20.190670 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Oct 2 18:49:20.190690 kernel: Movable zone start for each node Oct 2 18:49:20.190704 kernel: Early memory node ranges Oct 2 18:49:20.190719 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Oct 2 18:49:20.190733 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Oct 2 18:49:20.190747 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Oct 2 18:49:20.190761 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Oct 2 18:49:20.190776 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Oct 2 18:49:20.190790 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Oct 2 18:49:20.190804 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:49:20.190819 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Oct 2 18:49:20.190833 kernel: psci: probing for conduit method from ACPI. Oct 2 18:49:20.190847 kernel: psci: PSCIv1.0 detected in firmware. Oct 2 18:49:20.190865 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 18:49:20.190880 kernel: psci: Trusted OS migration not required Oct 2 18:49:20.190901 kernel: psci: SMC Calling Convention v1.1 Oct 2 18:49:20.190916 kernel: ACPI: SRAT not present Oct 2 18:49:20.190932 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 18:49:20.190951 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 18:49:20.190967 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 18:49:20.190982 kernel: Detected PIPT I-cache on CPU0 Oct 2 18:49:20.190997 kernel: CPU features: detected: GIC system register CPU interface Oct 2 18:49:20.191012 kernel: CPU features: detected: Spectre-v2 Oct 2 18:49:20.191027 kernel: CPU features: detected: Spectre-v3a Oct 2 18:49:20.191042 kernel: CPU features: detected: Spectre-BHB Oct 2 18:49:20.191057 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 18:49:20.191073 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 18:49:20.191088 kernel: CPU features: detected: ARM erratum 1742098 Oct 2 18:49:20.191103 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Oct 2 18:49:20.191385 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Oct 2 18:49:20.201151 kernel: Policy zone: Normal Oct 2 18:49:20.201182 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:49:20.201200 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 18:49:20.201215 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 18:49:20.201231 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 18:49:20.201246 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 18:49:20.201262 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Oct 2 18:49:20.201279 kernel: Memory: 3826444K/4030464K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 204020K reserved, 0K cma-reserved) Oct 2 18:49:20.201295 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 18:49:20.201318 kernel: trace event string verifier disabled Oct 2 18:49:20.201334 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 18:49:20.201350 kernel: rcu: RCU event tracing is enabled. Oct 2 18:49:20.201366 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 18:49:20.201381 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 18:49:20.201397 kernel: Tracing variant of Tasks RCU enabled. Oct 2 18:49:20.201413 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 18:49:20.201428 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 18:49:20.201443 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 18:49:20.201459 kernel: GICv3: 96 SPIs implemented Oct 2 18:49:20.201501 kernel: GICv3: 0 Extended SPIs implemented Oct 2 18:49:20.201519 kernel: GICv3: Distributor has no Range Selector support Oct 2 18:49:20.201540 kernel: Root IRQ handler: gic_handle_irq Oct 2 18:49:20.201555 kernel: GICv3: 16 PPIs implemented Oct 2 18:49:20.201571 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Oct 2 18:49:20.201586 kernel: ACPI: SRAT not present Oct 2 18:49:20.201601 kernel: ITS [mem 0x10080000-0x1009ffff] Oct 2 18:49:20.201616 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Oct 2 18:49:20.201632 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Oct 2 18:49:20.201647 kernel: GICv3: using LPI property table @0x00000004000c0000 Oct 2 18:49:20.201662 kernel: ITS: Using hypervisor restricted LPI range [128] Oct 2 18:49:20.201678 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Oct 2 18:49:20.201693 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Oct 2 18:49:20.201712 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Oct 2 18:49:20.201728 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Oct 2 18:49:20.201743 kernel: Console: colour dummy device 80x25 Oct 2 18:49:20.201759 kernel: printk: console [tty1] enabled Oct 2 18:49:20.201774 kernel: ACPI: Core revision 20210730 Oct 2 18:49:20.201790 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Oct 2 18:49:20.201806 kernel: pid_max: default: 32768 minimum: 301 Oct 2 18:49:20.201822 kernel: LSM: Security Framework initializing Oct 2 18:49:20.201838 kernel: SELinux: Initializing. Oct 2 18:49:20.201854 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:49:20.201874 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:49:20.201889 kernel: rcu: Hierarchical SRCU implementation. Oct 2 18:49:20.201905 kernel: Platform MSI: ITS@0x10080000 domain created Oct 2 18:49:20.201921 kernel: PCI/MSI: ITS@0x10080000 domain created Oct 2 18:49:20.201936 kernel: Remapping and enabling EFI services. Oct 2 18:49:20.201951 kernel: smp: Bringing up secondary CPUs ... Oct 2 18:49:20.201967 kernel: Detected PIPT I-cache on CPU1 Oct 2 18:49:20.201983 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Oct 2 18:49:20.201998 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Oct 2 18:49:20.202018 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Oct 2 18:49:20.202033 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 18:49:20.202049 kernel: SMP: Total of 2 processors activated. Oct 2 18:49:20.202064 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 18:49:20.202106 kernel: CPU features: detected: 32-bit EL1 Support Oct 2 18:49:20.202123 kernel: CPU features: detected: CRC32 instructions Oct 2 18:49:20.202138 kernel: CPU: All CPU(s) started at EL1 Oct 2 18:49:20.202154 kernel: alternatives: patching kernel code Oct 2 18:49:20.202170 kernel: devtmpfs: initialized Oct 2 18:49:20.202190 kernel: KASLR disabled due to lack of seed Oct 2 18:49:20.202205 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 18:49:20.202222 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 18:49:20.202247 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 18:49:20.202267 kernel: SMBIOS 3.0.0 present. Oct 2 18:49:20.202284 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Oct 2 18:49:20.202300 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 18:49:20.202316 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 18:49:20.202332 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 18:49:20.202349 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 18:49:20.202365 kernel: audit: initializing netlink subsys (disabled) Oct 2 18:49:20.202381 kernel: audit: type=2000 audit(0.248:1): state=initialized audit_enabled=0 res=1 Oct 2 18:49:20.202401 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 18:49:20.202418 kernel: cpuidle: using governor menu Oct 2 18:49:20.202434 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 18:49:20.202450 kernel: ASID allocator initialised with 32768 entries Oct 2 18:49:20.202466 kernel: ACPI: bus type PCI registered Oct 2 18:49:20.202486 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 18:49:20.202502 kernel: Serial: AMBA PL011 UART driver Oct 2 18:49:20.202519 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 18:49:20.202535 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 18:49:20.202551 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 18:49:20.202567 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 18:49:20.202583 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 18:49:20.202599 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 18:49:20.202615 kernel: ACPI: Added _OSI(Module Device) Oct 2 18:49:20.202635 kernel: ACPI: Added _OSI(Processor Device) Oct 2 18:49:20.202652 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 18:49:20.202668 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 18:49:20.202684 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 18:49:20.202700 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 18:49:20.202716 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 18:49:20.202732 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 18:49:20.202748 kernel: ACPI: Interpreter enabled Oct 2 18:49:20.202764 kernel: ACPI: Using GIC for interrupt routing Oct 2 18:49:20.202784 kernel: ACPI: MCFG table detected, 1 entries Oct 2 18:49:20.202800 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Oct 2 18:49:20.204288 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 18:49:20.204510 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 2 18:49:20.204728 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 2 18:49:20.204926 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Oct 2 18:49:20.205153 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Oct 2 18:49:20.205186 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Oct 2 18:49:20.205203 kernel: acpiphp: Slot [1] registered Oct 2 18:49:20.205220 kernel: acpiphp: Slot [2] registered Oct 2 18:49:20.205236 kernel: acpiphp: Slot [3] registered Oct 2 18:49:20.205253 kernel: acpiphp: Slot [4] registered Oct 2 18:49:20.205269 kernel: acpiphp: Slot [5] registered Oct 2 18:49:20.205285 kernel: acpiphp: Slot [6] registered Oct 2 18:49:20.205301 kernel: acpiphp: Slot [7] registered Oct 2 18:49:20.205317 kernel: acpiphp: Slot [8] registered Oct 2 18:49:20.205337 kernel: acpiphp: Slot [9] registered Oct 2 18:49:20.205354 kernel: acpiphp: Slot [10] registered Oct 2 18:49:20.205370 kernel: acpiphp: Slot [11] registered Oct 2 18:49:20.205386 kernel: acpiphp: Slot [12] registered Oct 2 18:49:20.205402 kernel: acpiphp: Slot [13] registered Oct 2 18:49:20.205418 kernel: acpiphp: Slot [14] registered Oct 2 18:49:20.205434 kernel: acpiphp: Slot [15] registered Oct 2 18:49:20.205450 kernel: acpiphp: Slot [16] registered Oct 2 18:49:20.205465 kernel: acpiphp: Slot [17] registered Oct 2 18:49:20.205481 kernel: acpiphp: Slot [18] registered Oct 2 18:49:20.205502 kernel: acpiphp: Slot [19] registered Oct 2 18:49:20.205518 kernel: acpiphp: Slot [20] registered Oct 2 18:49:20.205534 kernel: acpiphp: Slot [21] registered Oct 2 18:49:20.205550 kernel: acpiphp: Slot [22] registered Oct 2 18:49:20.205566 kernel: acpiphp: Slot [23] registered Oct 2 18:49:20.205582 kernel: acpiphp: Slot [24] registered Oct 2 18:49:20.205598 kernel: acpiphp: Slot [25] registered Oct 2 18:49:20.205614 kernel: acpiphp: Slot [26] registered Oct 2 18:49:20.205630 kernel: acpiphp: Slot [27] registered Oct 2 18:49:20.205650 kernel: acpiphp: Slot [28] registered Oct 2 18:49:20.205666 kernel: acpiphp: Slot [29] registered Oct 2 18:49:20.205682 kernel: acpiphp: Slot [30] registered Oct 2 18:49:20.205698 kernel: acpiphp: Slot [31] registered Oct 2 18:49:20.205714 kernel: PCI host bridge to bus 0000:00 Oct 2 18:49:20.205913 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Oct 2 18:49:20.208589 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 2 18:49:20.208876 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Oct 2 18:49:20.209139 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Oct 2 18:49:20.209394 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Oct 2 18:49:20.209639 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Oct 2 18:49:20.209869 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Oct 2 18:49:20.210144 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 18:49:20.210380 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Oct 2 18:49:20.210611 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:49:20.210850 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 18:49:20.211097 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Oct 2 18:49:20.211340 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Oct 2 18:49:20.211569 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Oct 2 18:49:20.211801 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:49:20.212033 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Oct 2 18:49:20.212356 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Oct 2 18:49:20.212602 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Oct 2 18:49:20.212864 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Oct 2 18:49:20.213142 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Oct 2 18:49:20.213365 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Oct 2 18:49:20.213584 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 2 18:49:20.213804 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Oct 2 18:49:20.213836 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 2 18:49:20.213854 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 2 18:49:20.213871 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 2 18:49:20.213888 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 2 18:49:20.213904 kernel: iommu: Default domain type: Translated Oct 2 18:49:20.213920 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 18:49:20.213936 kernel: vgaarb: loaded Oct 2 18:49:20.213953 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 18:49:20.213969 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 18:49:20.213990 kernel: PTP clock support registered Oct 2 18:49:20.214006 kernel: Registered efivars operations Oct 2 18:49:20.214023 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 18:49:20.214039 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 18:49:20.214056 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 18:49:20.214123 kernel: pnp: PnP ACPI init Oct 2 18:49:20.214377 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Oct 2 18:49:20.214404 kernel: pnp: PnP ACPI: found 1 devices Oct 2 18:49:20.214421 kernel: NET: Registered PF_INET protocol family Oct 2 18:49:20.214444 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 18:49:20.214461 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 18:49:20.214477 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 18:49:20.214494 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 18:49:20.214511 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 18:49:20.214528 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 18:49:20.214545 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:49:20.214561 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:49:20.214577 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 18:49:20.214599 kernel: PCI: CLS 0 bytes, default 64 Oct 2 18:49:20.214616 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Oct 2 18:49:20.214632 kernel: kvm [1]: HYP mode not available Oct 2 18:49:20.214648 kernel: Initialise system trusted keyrings Oct 2 18:49:20.214665 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 18:49:20.214681 kernel: Key type asymmetric registered Oct 2 18:49:20.214697 kernel: Asymmetric key parser 'x509' registered Oct 2 18:49:20.214714 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 18:49:20.214730 kernel: io scheduler mq-deadline registered Oct 2 18:49:20.214750 kernel: io scheduler kyber registered Oct 2 18:49:20.214767 kernel: io scheduler bfq registered Oct 2 18:49:20.215005 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Oct 2 18:49:20.215031 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 2 18:49:20.215048 kernel: ACPI: button: Power Button [PWRB] Oct 2 18:49:20.215065 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 18:49:20.215120 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Oct 2 18:49:20.215361 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Oct 2 18:49:20.215389 kernel: printk: console [ttyS0] disabled Oct 2 18:49:20.215407 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Oct 2 18:49:20.215423 kernel: printk: console [ttyS0] enabled Oct 2 18:49:20.215440 kernel: printk: bootconsole [uart0] disabled Oct 2 18:49:20.215456 kernel: thunder_xcv, ver 1.0 Oct 2 18:49:20.215472 kernel: thunder_bgx, ver 1.0 Oct 2 18:49:20.215488 kernel: nicpf, ver 1.0 Oct 2 18:49:20.215504 kernel: nicvf, ver 1.0 Oct 2 18:49:20.215754 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 18:49:20.215980 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T18:49:19 UTC (1696272559) Oct 2 18:49:20.216004 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 18:49:20.216020 kernel: NET: Registered PF_INET6 protocol family Oct 2 18:49:20.216037 kernel: Segment Routing with IPv6 Oct 2 18:49:20.216053 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 18:49:20.216149 kernel: NET: Registered PF_PACKET protocol family Oct 2 18:49:20.216172 kernel: Key type dns_resolver registered Oct 2 18:49:20.216189 kernel: registered taskstats version 1 Oct 2 18:49:20.216211 kernel: Loading compiled-in X.509 certificates Oct 2 18:49:20.216229 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 18:49:20.216246 kernel: Key type .fscrypt registered Oct 2 18:49:20.216262 kernel: Key type fscrypt-provisioning registered Oct 2 18:49:20.216278 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 18:49:20.216294 kernel: ima: Allocated hash algorithm: sha1 Oct 2 18:49:20.216311 kernel: ima: No architecture policies found Oct 2 18:49:20.216327 kernel: Freeing unused kernel memory: 34560K Oct 2 18:49:20.216343 kernel: Run /init as init process Oct 2 18:49:20.216363 kernel: with arguments: Oct 2 18:49:20.216380 kernel: /init Oct 2 18:49:20.216396 kernel: with environment: Oct 2 18:49:20.216411 kernel: HOME=/ Oct 2 18:49:20.216427 kernel: TERM=linux Oct 2 18:49:20.216443 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 18:49:20.216464 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:49:20.216486 systemd[1]: Detected virtualization amazon. Oct 2 18:49:20.216508 systemd[1]: Detected architecture arm64. Oct 2 18:49:20.216525 systemd[1]: Running in initrd. Oct 2 18:49:20.216543 systemd[1]: No hostname configured, using default hostname. Oct 2 18:49:20.216560 systemd[1]: Hostname set to . Oct 2 18:49:20.216579 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:49:20.216596 systemd[1]: Queued start job for default target initrd.target. Oct 2 18:49:20.216614 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:49:20.216631 systemd[1]: Reached target cryptsetup.target. Oct 2 18:49:20.216652 systemd[1]: Reached target paths.target. Oct 2 18:49:20.216688 systemd[1]: Reached target slices.target. Oct 2 18:49:20.216710 systemd[1]: Reached target swap.target. Oct 2 18:49:20.216728 systemd[1]: Reached target timers.target. Oct 2 18:49:20.216746 systemd[1]: Listening on iscsid.socket. Oct 2 18:49:20.216764 systemd[1]: Listening on iscsiuio.socket. Oct 2 18:49:20.216782 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 18:49:20.216800 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 18:49:20.216822 systemd[1]: Listening on systemd-journald.socket. Oct 2 18:49:20.216840 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:49:20.216858 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:49:20.216875 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:49:20.216893 systemd[1]: Reached target sockets.target. Oct 2 18:49:20.216911 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:49:20.216929 systemd[1]: Finished network-cleanup.service. Oct 2 18:49:20.216946 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 18:49:20.216964 systemd[1]: Starting systemd-journald.service... Oct 2 18:49:20.216986 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:49:20.217004 systemd[1]: Starting systemd-resolved.service... Oct 2 18:49:20.217022 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 18:49:20.217040 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:49:20.217057 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 18:49:20.217138 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 18:49:20.217159 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 18:49:20.217178 kernel: audit: type=1130 audit(1696272560.141:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.217201 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 18:49:20.217218 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 18:49:20.217237 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 18:49:20.217255 kernel: audit: type=1130 audit(1696272560.190:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.217271 kernel: Bridge firewalling registered Oct 2 18:49:20.217292 systemd-journald[308]: Journal started Oct 2 18:49:20.217383 systemd-journald[308]: Runtime Journal (/run/log/journal/ec25afb38fb639f84f808187153383fc) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:49:20.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.221481 systemd[1]: Started systemd-journald.service. Oct 2 18:49:20.221529 kernel: audit: type=1130 audit(1696272560.220:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.127636 systemd-modules-load[309]: Inserted module 'overlay' Oct 2 18:49:20.206986 systemd-modules-load[309]: Inserted module 'br_netfilter' Oct 2 18:49:20.228059 systemd-resolved[310]: Positive Trust Anchors: Oct 2 18:49:20.228092 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:49:20.228149 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:49:20.271978 kernel: SCSI subsystem initialized Oct 2 18:49:20.291116 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 18:49:20.291183 kernel: device-mapper: uevent: version 1.0.3 Oct 2 18:49:20.291207 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 18:49:20.291679 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 18:49:20.305185 kernel: audit: type=1130 audit(1696272560.295:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.309832 systemd[1]: Starting dracut-cmdline.service... Oct 2 18:49:20.319801 systemd-modules-load[309]: Inserted module 'dm_multipath' Oct 2 18:49:20.323565 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:49:20.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.338486 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:49:20.345787 kernel: audit: type=1130 audit(1696272560.324:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.364910 dracut-cmdline[325]: dracut-dracut-053 Oct 2 18:49:20.380546 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:49:20.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.391322 dracut-cmdline[325]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:49:20.408821 kernel: audit: type=1130 audit(1696272560.381:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.629105 kernel: Loading iSCSI transport class v2.0-870. Oct 2 18:49:20.643103 kernel: iscsi: registered transport (tcp) Oct 2 18:49:20.669765 kernel: iscsi: registered transport (qla4xxx) Oct 2 18:49:20.669847 kernel: QLogic iSCSI HBA Driver Oct 2 18:49:20.817773 systemd-resolved[310]: Defaulting to hostname 'linux'. Oct 2 18:49:20.820278 kernel: random: crng init done Oct 2 18:49:20.821931 systemd[1]: Started systemd-resolved.service. Oct 2 18:49:20.832291 kernel: audit: type=1130 audit(1696272560.822:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.831618 systemd[1]: Reached target nss-lookup.target. Oct 2 18:49:20.886725 systemd[1]: Finished dracut-cmdline.service. Oct 2 18:49:20.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:20.891356 systemd[1]: Starting dracut-pre-udev.service... Oct 2 18:49:20.901334 kernel: audit: type=1130 audit(1696272560.887:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.001106 kernel: raid6: neonx8 gen() 6333 MB/s Oct 2 18:49:21.019089 kernel: raid6: neonx8 xor() 4752 MB/s Oct 2 18:49:21.032125 kernel: raid6: neonx4 gen() 6429 MB/s Oct 2 18:49:21.039106 kernel: raid6: neonx4 xor() 4937 MB/s Oct 2 18:49:21.057108 kernel: raid6: neonx2 gen() 5686 MB/s Oct 2 18:49:21.075106 kernel: raid6: neonx2 xor() 4535 MB/s Oct 2 18:49:21.093105 kernel: raid6: neonx1 gen() 4434 MB/s Oct 2 18:49:21.111104 kernel: raid6: neonx1 xor() 3685 MB/s Oct 2 18:49:21.129105 kernel: raid6: int64x8 gen() 3402 MB/s Oct 2 18:49:21.163089 kernel: raid6: int64x8 xor() 2093 MB/s Oct 2 18:49:21.176118 kernel: raid6: int64x4 gen() 3755 MB/s Oct 2 18:49:21.183106 kernel: raid6: int64x4 xor() 2200 MB/s Oct 2 18:49:21.201105 kernel: raid6: int64x2 gen() 3541 MB/s Oct 2 18:49:21.219105 kernel: raid6: int64x2 xor() 1953 MB/s Oct 2 18:49:21.237106 kernel: raid6: int64x1 gen() 2764 MB/s Oct 2 18:49:21.256641 kernel: raid6: int64x1 xor() 1453 MB/s Oct 2 18:49:21.256687 kernel: raid6: using algorithm neonx4 gen() 6429 MB/s Oct 2 18:49:21.256712 kernel: raid6: .... xor() 4937 MB/s, rmw enabled Oct 2 18:49:21.258463 kernel: raid6: using neon recovery algorithm Oct 2 18:49:21.277109 kernel: xor: measuring software checksum speed Oct 2 18:49:21.279101 kernel: 8regs : 9351 MB/sec Oct 2 18:49:21.282103 kernel: 32regs : 11108 MB/sec Oct 2 18:49:21.286105 kernel: arm64_neon : 9569 MB/sec Oct 2 18:49:21.286139 kernel: xor: using function: 32regs (11108 MB/sec) Oct 2 18:49:21.374126 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 18:49:21.412154 systemd[1]: Finished dracut-pre-udev.service. Oct 2 18:49:21.422700 kernel: audit: type=1130 audit(1696272561.412:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.422000 audit: BPF prog-id=7 op=LOAD Oct 2 18:49:21.422000 audit: BPF prog-id=8 op=LOAD Oct 2 18:49:21.424160 systemd[1]: Starting systemd-udevd.service... Oct 2 18:49:21.460880 systemd-udevd[508]: Using default interface naming scheme 'v252'. Oct 2 18:49:21.471666 systemd[1]: Started systemd-udevd.service. Oct 2 18:49:21.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.479482 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 18:49:21.545388 dracut-pre-trigger[521]: rd.md=0: removing MD RAID activation Oct 2 18:49:21.652812 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 18:49:21.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.657373 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:49:21.768304 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:49:21.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:21.907296 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 2 18:49:21.907362 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Oct 2 18:49:21.924296 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 18:49:21.924628 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 18:49:21.935971 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:dd:91:07:65:19 Oct 2 18:49:21.936275 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Oct 2 18:49:21.935951 (udev-worker)[564]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:21.941080 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 18:49:21.950109 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 18:49:21.956282 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 18:49:21.956344 kernel: GPT:9289727 != 16777215 Oct 2 18:49:21.956368 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 18:49:21.961256 kernel: GPT:9289727 != 16777215 Oct 2 18:49:21.961309 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 18:49:21.965031 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:22.043106 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (559) Oct 2 18:49:22.124195 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 18:49:22.178251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:49:22.272511 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 18:49:22.285027 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 18:49:22.289282 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 18:49:22.295444 systemd[1]: Starting disk-uuid.service... Oct 2 18:49:22.317109 disk-uuid[674]: Primary Header is updated. Oct 2 18:49:22.317109 disk-uuid[674]: Secondary Entries is updated. Oct 2 18:49:22.317109 disk-uuid[674]: Secondary Header is updated. Oct 2 18:49:22.326113 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:23.345109 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:49:23.345967 disk-uuid[675]: The operation has completed successfully. Oct 2 18:49:23.617243 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 18:49:23.619566 systemd[1]: Finished disk-uuid.service. Oct 2 18:49:23.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:23.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:23.641388 systemd[1]: Starting verity-setup.service... Oct 2 18:49:23.712117 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 18:49:23.812925 systemd[1]: Found device dev-mapper-usr.device. Oct 2 18:49:23.822060 systemd[1]: Mounting sysusr-usr.mount... Oct 2 18:49:23.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:23.827613 systemd[1]: Finished verity-setup.service. Oct 2 18:49:23.840754 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 18:49:23.840789 kernel: audit: type=1130 audit(1696272563.828:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:23.922115 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 18:49:23.923315 systemd[1]: Mounted sysusr-usr.mount. Oct 2 18:49:23.926401 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 18:49:23.930475 systemd[1]: Starting ignition-setup.service... Oct 2 18:49:23.942853 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 18:49:23.973589 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:23.973667 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:23.975874 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:23.994349 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:24.027295 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 18:49:24.069296 systemd[1]: Finished ignition-setup.service. Oct 2 18:49:24.083242 kernel: audit: type=1130 audit(1696272564.070:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.074428 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 18:49:24.296145 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 18:49:24.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.306000 audit: BPF prog-id=9 op=LOAD Oct 2 18:49:24.310264 kernel: audit: type=1130 audit(1696272564.298:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.310322 kernel: audit: type=1334 audit(1696272564.306:21): prog-id=9 op=LOAD Oct 2 18:49:24.309424 systemd[1]: Starting systemd-networkd.service... Oct 2 18:49:24.370586 systemd-networkd[1199]: lo: Link UP Oct 2 18:49:24.370606 systemd-networkd[1199]: lo: Gained carrier Oct 2 18:49:24.374291 systemd-networkd[1199]: Enumeration completed Oct 2 18:49:24.374551 systemd[1]: Started systemd-networkd.service. Oct 2 18:49:24.374819 systemd-networkd[1199]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:49:24.397887 kernel: audit: type=1130 audit(1696272564.382:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.383436 systemd[1]: Reached target network.target. Oct 2 18:49:24.393727 systemd[1]: Starting iscsiuio.service... Oct 2 18:49:24.414365 systemd-networkd[1199]: eth0: Link UP Oct 2 18:49:24.414545 systemd-networkd[1199]: eth0: Gained carrier Oct 2 18:49:24.418104 systemd[1]: Started iscsiuio.service. Oct 2 18:49:24.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.441141 systemd[1]: Starting iscsid.service... Oct 2 18:49:24.444004 kernel: audit: type=1130 audit(1696272564.432:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.449302 systemd-networkd[1199]: eth0: DHCPv4 address 172.31.21.44/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:49:24.465965 iscsid[1204]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:49:24.465965 iscsid[1204]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 18:49:24.465965 iscsid[1204]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 18:49:24.465965 iscsid[1204]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 18:49:24.465965 iscsid[1204]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:49:24.498726 kernel: audit: type=1130 audit(1696272564.482:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.498840 iscsid[1204]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 18:49:24.481643 systemd[1]: Started iscsid.service. Oct 2 18:49:24.494494 systemd[1]: Starting dracut-initqueue.service... Oct 2 18:49:24.540200 systemd[1]: Finished dracut-initqueue.service. Oct 2 18:49:24.568315 kernel: audit: type=1130 audit(1696272564.539:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.540523 systemd[1]: Reached target remote-fs-pre.target. Oct 2 18:49:24.541224 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:49:24.541980 systemd[1]: Reached target remote-fs.target. Oct 2 18:49:24.562573 systemd[1]: Starting dracut-pre-mount.service... Oct 2 18:49:24.598771 systemd[1]: Finished dracut-pre-mount.service. Oct 2 18:49:24.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.610120 kernel: audit: type=1130 audit(1696272564.600:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.763062 ignition[1121]: Ignition 2.14.0 Oct 2 18:49:24.764814 ignition[1121]: Stage: fetch-offline Oct 2 18:49:24.766648 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:24.767001 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:24.784848 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:24.785866 ignition[1121]: Ignition finished successfully Oct 2 18:49:24.789555 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 18:49:24.800535 kernel: audit: type=1130 audit(1696272564.790:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.801891 systemd[1]: Starting ignition-fetch.service... Oct 2 18:49:24.831480 ignition[1223]: Ignition 2.14.0 Oct 2 18:49:24.831509 ignition[1223]: Stage: fetch Oct 2 18:49:24.831862 ignition[1223]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:24.831920 ignition[1223]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:24.846155 ignition[1223]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:24.848789 ignition[1223]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:24.857190 ignition[1223]: INFO : PUT result: OK Oct 2 18:49:24.860477 ignition[1223]: DEBUG : parsed url from cmdline: "" Oct 2 18:49:24.862352 ignition[1223]: INFO : no config URL provided Oct 2 18:49:24.862352 ignition[1223]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 18:49:24.862352 ignition[1223]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 18:49:24.862352 ignition[1223]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:24.871145 ignition[1223]: INFO : PUT result: OK Oct 2 18:49:24.872841 ignition[1223]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 18:49:24.877057 ignition[1223]: INFO : GET result: OK Oct 2 18:49:24.878954 ignition[1223]: DEBUG : parsing config with SHA512: f8409d3d8d828e7391bca31063c986549d7c8b616c45dac8a0a8542832262ea1545c1f74d3134686065844fddb4975414cd007e941588bc7cdea08bc7c9d267f Oct 2 18:49:24.918978 unknown[1223]: fetched base config from "system" Oct 2 18:49:24.919258 unknown[1223]: fetched base config from "system" Oct 2 18:49:24.920392 ignition[1223]: fetch: fetch complete Oct 2 18:49:24.919274 unknown[1223]: fetched user config from "aws" Oct 2 18:49:24.920406 ignition[1223]: fetch: fetch passed Oct 2 18:49:24.920488 ignition[1223]: Ignition finished successfully Oct 2 18:49:24.931280 systemd[1]: Finished ignition-fetch.service. Oct 2 18:49:24.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:24.935711 systemd[1]: Starting ignition-kargs.service... Oct 2 18:49:24.968232 ignition[1229]: Ignition 2.14.0 Oct 2 18:49:24.968261 ignition[1229]: Stage: kargs Oct 2 18:49:24.968614 ignition[1229]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:24.968690 ignition[1229]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:24.983680 ignition[1229]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:24.986135 ignition[1229]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:24.989374 ignition[1229]: INFO : PUT result: OK Oct 2 18:49:24.994463 ignition[1229]: kargs: kargs passed Oct 2 18:49:24.994571 ignition[1229]: Ignition finished successfully Oct 2 18:49:24.999120 systemd[1]: Finished ignition-kargs.service. Oct 2 18:49:25.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.003741 systemd[1]: Starting ignition-disks.service... Oct 2 18:49:25.030633 ignition[1235]: Ignition 2.14.0 Oct 2 18:49:25.030659 ignition[1235]: Stage: disks Oct 2 18:49:25.031015 ignition[1235]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:25.031100 ignition[1235]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:25.045883 ignition[1235]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:25.048804 ignition[1235]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:25.051961 ignition[1235]: INFO : PUT result: OK Oct 2 18:49:25.056290 ignition[1235]: disks: disks passed Oct 2 18:49:25.056392 ignition[1235]: Ignition finished successfully Oct 2 18:49:25.060666 systemd[1]: Finished ignition-disks.service. Oct 2 18:49:25.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.064000 systemd[1]: Reached target initrd-root-device.target. Oct 2 18:49:25.067382 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:49:25.069182 systemd[1]: Reached target local-fs.target. Oct 2 18:49:25.072239 systemd[1]: Reached target sysinit.target. Oct 2 18:49:25.075158 systemd[1]: Reached target basic.target. Oct 2 18:49:25.081036 systemd[1]: Starting systemd-fsck-root.service... Oct 2 18:49:25.129054 systemd-fsck[1244]: ROOT: clean, 603/553520 files, 56011/553472 blocks Oct 2 18:49:25.140782 systemd[1]: Finished systemd-fsck-root.service. Oct 2 18:49:25.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.144564 systemd[1]: Mounting sysroot.mount... Oct 2 18:49:25.168111 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 18:49:25.170686 systemd[1]: Mounted sysroot.mount. Oct 2 18:49:25.171932 systemd[1]: Reached target initrd-root-fs.target. Oct 2 18:49:25.186201 systemd[1]: Mounting sysroot-usr.mount... Oct 2 18:49:25.188430 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 18:49:25.188521 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 18:49:25.188588 systemd[1]: Reached target ignition-diskful.target. Oct 2 18:49:25.215426 systemd[1]: Mounted sysroot-usr.mount. Oct 2 18:49:25.221342 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:49:25.226225 systemd[1]: Starting initrd-setup-root.service... Oct 2 18:49:25.252103 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1261) Oct 2 18:49:25.259618 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:25.259683 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:25.261853 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:25.269142 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:25.272149 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:49:25.275705 initrd-setup-root[1266]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 18:49:25.309545 initrd-setup-root[1292]: cut: /sysroot/etc/group: No such file or directory Oct 2 18:49:25.328980 initrd-setup-root[1300]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 18:49:25.348382 initrd-setup-root[1308]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 18:49:25.583023 systemd[1]: Finished initrd-setup-root.service. Oct 2 18:49:25.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.587605 systemd[1]: Starting ignition-mount.service... Oct 2 18:49:25.592231 systemd[1]: Starting sysroot-boot.service... Oct 2 18:49:25.618260 systemd-networkd[1199]: eth0: Gained IPv6LL Oct 2 18:49:25.622686 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 18:49:25.622846 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 18:49:25.662754 systemd[1]: Finished sysroot-boot.service. Oct 2 18:49:25.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.679625 ignition[1328]: INFO : Ignition 2.14.0 Oct 2 18:49:25.681569 ignition[1328]: INFO : Stage: mount Oct 2 18:49:25.683114 ignition[1328]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:25.696826 ignition[1328]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:25.705825 ignition[1328]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:25.705825 ignition[1328]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:25.710867 ignition[1328]: INFO : PUT result: OK Oct 2 18:49:25.716414 ignition[1328]: INFO : mount: mount passed Oct 2 18:49:25.718119 ignition[1328]: INFO : Ignition finished successfully Oct 2 18:49:25.721484 systemd[1]: Finished ignition-mount.service. Oct 2 18:49:25.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:25.723409 systemd[1]: Starting ignition-files.service... Oct 2 18:49:25.748869 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:49:25.772116 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1337) Oct 2 18:49:25.778395 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:49:25.778441 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:49:25.778465 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:49:25.787112 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:49:25.792382 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:49:25.828491 ignition[1356]: INFO : Ignition 2.14.0 Oct 2 18:49:25.828491 ignition[1356]: INFO : Stage: files Oct 2 18:49:25.831921 ignition[1356]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:25.831921 ignition[1356]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:25.850331 ignition[1356]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:25.852935 ignition[1356]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:25.856627 ignition[1356]: INFO : PUT result: OK Oct 2 18:49:25.861327 ignition[1356]: DEBUG : files: compiled without relabeling support, skipping Oct 2 18:49:25.866437 ignition[1356]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 18:49:25.869348 ignition[1356]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 18:49:25.923103 ignition[1356]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 18:49:25.926052 ignition[1356]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 18:49:25.929894 unknown[1356]: wrote ssh authorized keys file for user: core Oct 2 18:49:25.932296 ignition[1356]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 18:49:25.935839 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 18:49:25.939802 ignition[1356]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 18:49:26.405563 ignition[1356]: INFO : GET result: OK Oct 2 18:49:26.944421 ignition[1356]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 18:49:26.949559 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 18:49:26.949559 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 18:49:26.949559 ignition[1356]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 18:49:27.047560 ignition[1356]: INFO : GET result: OK Oct 2 18:49:27.320593 ignition[1356]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 18:49:27.335003 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 18:49:27.335003 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:49:27.335003 ignition[1356]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:27.335003 ignition[1356]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1850727045" Oct 2 18:49:27.335003 ignition[1356]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1850727045": device or resource busy Oct 2 18:49:27.335003 ignition[1356]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1850727045", trying btrfs: device or resource busy Oct 2 18:49:27.335003 ignition[1356]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1850727045" Oct 2 18:49:27.366930 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1356) Oct 2 18:49:27.366981 ignition[1356]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1850727045" Oct 2 18:49:27.370281 ignition[1356]: INFO : op(3): [started] unmounting "/mnt/oem1850727045" Oct 2 18:49:27.382950 ignition[1356]: INFO : op(3): [finished] unmounting "/mnt/oem1850727045" Oct 2 18:49:27.385960 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:49:27.385960 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:49:27.385960 ignition[1356]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Oct 2 18:49:27.388018 systemd[1]: mnt-oem1850727045.mount: Deactivated successfully. Oct 2 18:49:27.552381 ignition[1356]: INFO : GET result: OK Oct 2 18:49:28.224772 ignition[1356]: DEBUG : file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Oct 2 18:49:28.229881 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:49:28.229881 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:49:28.229881 ignition[1356]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Oct 2 18:49:28.276513 ignition[1356]: INFO : GET result: OK Oct 2 18:49:30.862725 ignition[1356]: DEBUG : file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Oct 2 18:49:30.868213 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:49:30.868213 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:49:30.868213 ignition[1356]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Oct 2 18:49:30.930385 ignition[1356]: INFO : GET result: OK Oct 2 18:49:31.752019 ignition[1356]: DEBUG : file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Oct 2 18:49:31.756774 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:49:31.756774 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:49:31.763737 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:49:31.767285 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 18:49:31.771039 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 18:49:31.774581 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:49:31.778244 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:49:31.781770 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:49:31.789168 ignition[1356]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:31.794920 ignition[1356]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem635150924" Oct 2 18:49:31.798234 ignition[1356]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem635150924": device or resource busy Oct 2 18:49:31.798234 ignition[1356]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem635150924", trying btrfs: device or resource busy Oct 2 18:49:31.798234 ignition[1356]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem635150924" Oct 2 18:49:31.823335 ignition[1356]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem635150924" Oct 2 18:49:31.823335 ignition[1356]: INFO : op(6): [started] unmounting "/mnt/oem635150924" Oct 2 18:49:31.823335 ignition[1356]: INFO : op(6): [finished] unmounting "/mnt/oem635150924" Oct 2 18:49:31.822208 systemd[1]: mnt-oem635150924.mount: Deactivated successfully. Oct 2 18:49:31.832886 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:49:31.832886 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:49:31.832886 ignition[1356]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:31.845568 ignition[1356]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem620195970" Oct 2 18:49:31.848513 ignition[1356]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem620195970": device or resource busy Oct 2 18:49:31.848513 ignition[1356]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem620195970", trying btrfs: device or resource busy Oct 2 18:49:31.848513 ignition[1356]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem620195970" Oct 2 18:49:31.869097 ignition[1356]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem620195970" Oct 2 18:49:31.875812 ignition[1356]: INFO : op(9): [started] unmounting "/mnt/oem620195970" Oct 2 18:49:31.875812 ignition[1356]: INFO : op(9): [finished] unmounting "/mnt/oem620195970" Oct 2 18:49:31.875812 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:49:31.871866 systemd[1]: mnt-oem620195970.mount: Deactivated successfully. Oct 2 18:49:31.892476 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:49:31.892476 ignition[1356]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:49:31.904263 ignition[1356]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1086655471" Oct 2 18:49:31.907258 ignition[1356]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1086655471": device or resource busy Oct 2 18:49:31.907258 ignition[1356]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1086655471", trying btrfs: device or resource busy Oct 2 18:49:31.907258 ignition[1356]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1086655471" Oct 2 18:49:31.917118 ignition[1356]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1086655471" Oct 2 18:49:31.917118 ignition[1356]: INFO : op(c): [started] unmounting "/mnt/oem1086655471" Oct 2 18:49:31.922790 ignition[1356]: INFO : op(c): [finished] unmounting "/mnt/oem1086655471" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(f): [started] processing unit "nvidia.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(f): [finished] processing unit "nvidia.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" Oct 2 18:49:31.922790 ignition[1356]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:49:31.946262 ignition[1356]: INFO : files: op(1b): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:49:32.006451 ignition[1356]: INFO : files: op(1b): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:49:32.026091 ignition[1356]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:49:32.029800 ignition[1356]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:49:32.033387 ignition[1356]: INFO : files: files passed Oct 2 18:49:32.033387 ignition[1356]: INFO : Ignition finished successfully Oct 2 18:49:32.041437 systemd[1]: Finished ignition-files.service. Oct 2 18:49:32.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.049796 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 18:49:32.049840 kernel: audit: type=1130 audit(1696272572.046:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.058653 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 18:49:32.062922 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 18:49:32.078476 systemd[1]: Starting ignition-quench.service... Oct 2 18:49:32.095719 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 18:49:32.098050 systemd[1]: Finished ignition-quench.service. Oct 2 18:49:32.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.115936 kernel: audit: type=1130 audit(1696272572.100:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.115986 kernel: audit: type=1131 audit(1696272572.100:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.121307 initrd-setup-root-after-ignition[1381]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 18:49:32.126583 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 18:49:32.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.130586 systemd[1]: Reached target ignition-complete.target. Oct 2 18:49:32.141713 kernel: audit: type=1130 audit(1696272572.129:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.143035 systemd[1]: Starting initrd-parse-etc.service... Oct 2 18:49:32.193183 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 18:49:32.193978 systemd[1]: Finished initrd-parse-etc.service. Oct 2 18:49:32.212810 kernel: audit: type=1130 audit(1696272572.195:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.214524 kernel: audit: type=1131 audit(1696272572.204:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.205311 systemd[1]: Reached target initrd-fs.target. Oct 2 18:49:32.214535 systemd[1]: Reached target initrd.target. Oct 2 18:49:32.216832 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 18:49:32.218372 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 18:49:32.262562 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 18:49:32.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.272619 systemd[1]: Starting initrd-cleanup.service... Oct 2 18:49:32.279110 kernel: audit: type=1130 audit(1696272572.261:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.302976 systemd[1]: Stopped target nss-lookup.target. Oct 2 18:49:32.306702 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 18:49:32.310634 systemd[1]: Stopped target timers.target. Oct 2 18:49:32.313904 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 18:49:32.316198 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 18:49:32.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.321422 systemd[1]: Stopped target initrd.target. Oct 2 18:49:32.332818 kernel: audit: type=1131 audit(1696272572.318:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.327381 systemd[1]: Stopped target basic.target. Oct 2 18:49:32.334556 systemd[1]: Stopped target ignition-complete.target. Oct 2 18:49:32.400296 kernel: audit: type=1131 audit(1696272572.348:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.400338 kernel: audit: type=1131 audit(1696272572.354:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.336546 systemd[1]: Stopped target ignition-diskful.target. Oct 2 18:49:32.338516 systemd[1]: Stopped target initrd-root-device.target. Oct 2 18:49:32.340570 systemd[1]: Stopped target remote-fs.target. Oct 2 18:49:32.342411 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 18:49:32.344319 systemd[1]: Stopped target sysinit.target. Oct 2 18:49:32.346150 systemd[1]: Stopped target local-fs.target. Oct 2 18:49:32.349393 systemd[1]: Stopped target local-fs-pre.target. Oct 2 18:49:32.351314 systemd[1]: Stopped target swap.target. Oct 2 18:49:32.352960 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 18:49:32.353204 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 18:49:32.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.355214 systemd[1]: Stopped target cryptsetup.target. Oct 2 18:49:32.357061 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 18:49:32.357279 systemd[1]: Stopped dracut-initqueue.service. Oct 2 18:49:32.359304 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 18:49:32.359518 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 18:49:32.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.361850 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 18:49:32.362052 systemd[1]: Stopped ignition-files.service. Oct 2 18:49:32.365391 systemd[1]: Stopping ignition-mount.service... Oct 2 18:49:32.366951 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 18:49:32.478341 ignition[1394]: INFO : Ignition 2.14.0 Oct 2 18:49:32.478341 ignition[1394]: INFO : Stage: umount Oct 2 18:49:32.478341 ignition[1394]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:49:32.478341 ignition[1394]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:49:32.367220 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 18:49:32.500034 ignition[1394]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:49:32.500034 ignition[1394]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:49:32.500034 ignition[1394]: INFO : PUT result: OK Oct 2 18:49:32.380559 systemd[1]: Stopping sysroot-boot.service... Oct 2 18:49:32.391232 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 18:49:32.391555 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 18:49:32.393746 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 18:49:32.393950 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 18:49:32.439056 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 18:49:32.439311 systemd[1]: Finished initrd-cleanup.service. Oct 2 18:49:32.523151 ignition[1394]: INFO : umount: umount passed Oct 2 18:49:32.523151 ignition[1394]: INFO : Ignition finished successfully Oct 2 18:49:32.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.525995 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 18:49:32.526241 systemd[1]: Stopped sysroot-boot.service. Oct 2 18:49:32.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.530326 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 18:49:32.530489 systemd[1]: Stopped ignition-mount.service. Oct 2 18:49:32.532484 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 18:49:32.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.533030 systemd[1]: Stopped ignition-disks.service. Oct 2 18:49:32.539302 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 18:49:32.539404 systemd[1]: Stopped ignition-kargs.service. Oct 2 18:49:32.549357 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 18:49:32.549458 systemd[1]: Stopped ignition-fetch.service. Oct 2 18:49:32.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.554704 systemd[1]: Stopped target network.target. Oct 2 18:49:32.557720 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 18:49:32.557819 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 18:49:32.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.563349 systemd[1]: Stopped target paths.target. Oct 2 18:49:32.563466 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 18:49:32.572174 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 18:49:32.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.574064 systemd[1]: Stopped target slices.target. Oct 2 18:49:32.575616 systemd[1]: Stopped target sockets.target. Oct 2 18:49:32.577271 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 18:49:32.577333 systemd[1]: Closed iscsid.socket. Oct 2 18:49:32.578786 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 18:49:32.578842 systemd[1]: Closed iscsiuio.socket. Oct 2 18:49:32.580293 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 18:49:32.580378 systemd[1]: Stopped ignition-setup.service. Oct 2 18:49:32.582096 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 18:49:32.582173 systemd[1]: Stopped initrd-setup-root.service. Oct 2 18:49:32.584107 systemd[1]: Stopping systemd-networkd.service... Oct 2 18:49:32.586597 systemd[1]: Stopping systemd-resolved.service... Oct 2 18:49:32.607337 systemd-networkd[1199]: eth0: DHCPv6 lease lost Oct 2 18:49:32.613160 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 18:49:32.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.613355 systemd[1]: Stopped systemd-resolved.service. Oct 2 18:49:32.617000 audit: BPF prog-id=6 op=UNLOAD Oct 2 18:49:32.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.618682 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 18:49:32.618884 systemd[1]: Stopped systemd-networkd.service. Oct 2 18:49:32.619326 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 18:49:32.619397 systemd[1]: Closed systemd-networkd.socket. Oct 2 18:49:32.626320 systemd[1]: Stopping network-cleanup.service... Oct 2 18:49:32.638336 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 18:49:32.638566 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 18:49:32.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.644253 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 18:49:32.645000 audit: BPF prog-id=9 op=UNLOAD Oct 2 18:49:32.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.644345 systemd[1]: Stopped systemd-sysctl.service. Oct 2 18:49:32.651012 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 18:49:32.651514 systemd[1]: Stopped systemd-modules-load.service. Oct 2 18:49:32.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.658154 systemd[1]: Stopping systemd-udevd.service... Oct 2 18:49:32.664790 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 18:49:32.667357 systemd[1]: Stopped systemd-udevd.service. Oct 2 18:49:32.671125 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 18:49:32.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.673715 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 18:49:32.679199 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 18:49:32.681497 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 18:49:32.685129 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 18:49:32.687208 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 18:49:32.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.690630 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 18:49:32.690718 systemd[1]: Stopped dracut-cmdline.service. Oct 2 18:49:32.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.695747 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 18:49:32.695839 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 18:49:32.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.702627 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 18:49:32.725095 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 18:49:32.725224 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 18:49:32.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.731840 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 18:49:32.733943 systemd[1]: Stopped network-cleanup.service. Oct 2 18:49:32.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.737422 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 18:49:32.739764 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 18:49:32.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:32.743608 systemd[1]: Reached target initrd-switch-root.target. Oct 2 18:49:32.748531 systemd[1]: Starting initrd-switch-root.service... Oct 2 18:49:32.773334 systemd[1]: Switching root. Oct 2 18:49:32.801542 iscsid[1204]: iscsid shutting down. Oct 2 18:49:32.805198 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Oct 2 18:49:32.805314 systemd-journald[308]: Journal stopped Oct 2 18:49:38.437812 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 18:49:38.448845 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 18:49:38.448894 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 18:49:38.448997 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 18:49:38.449032 kernel: SELinux: policy capability open_perms=1 Oct 2 18:49:38.454654 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 18:49:38.454740 kernel: SELinux: policy capability always_check_network=0 Oct 2 18:49:38.454772 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 18:49:38.454805 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 18:49:38.454836 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 18:49:38.454868 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 18:49:38.454902 systemd[1]: Successfully loaded SELinux policy in 97.360ms. Oct 2 18:49:38.455257 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.878ms. Oct 2 18:49:38.455299 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:49:38.455337 systemd[1]: Detected virtualization amazon. Oct 2 18:49:38.455367 systemd[1]: Detected architecture arm64. Oct 2 18:49:38.455399 systemd[1]: Detected first boot. Oct 2 18:49:38.455434 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:49:38.455465 systemd[1]: Populated /etc with preset unit settings. Oct 2 18:49:38.455497 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:49:38.455534 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:49:38.455569 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:49:38.455605 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 18:49:38.455700 kernel: audit: type=1334 audit(1696272577.895:82): prog-id=12 op=LOAD Oct 2 18:49:38.455735 kernel: audit: type=1334 audit(1696272577.899:83): prog-id=3 op=UNLOAD Oct 2 18:49:38.455767 kernel: audit: type=1334 audit(1696272577.900:84): prog-id=13 op=LOAD Oct 2 18:49:38.455796 kernel: audit: type=1334 audit(1696272577.900:85): prog-id=14 op=LOAD Oct 2 18:49:38.455826 kernel: audit: type=1334 audit(1696272577.900:86): prog-id=4 op=UNLOAD Oct 2 18:49:38.455856 kernel: audit: type=1334 audit(1696272577.900:87): prog-id=5 op=UNLOAD Oct 2 18:49:38.455885 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 18:49:38.455920 kernel: audit: type=1334 audit(1696272577.905:88): prog-id=15 op=LOAD Oct 2 18:49:38.455951 systemd[1]: Stopped iscsiuio.service. Oct 2 18:49:38.455983 kernel: audit: type=1334 audit(1696272577.905:89): prog-id=12 op=UNLOAD Oct 2 18:49:38.459784 kernel: audit: type=1334 audit(1696272577.908:90): prog-id=16 op=LOAD Oct 2 18:49:38.459845 kernel: audit: type=1334 audit(1696272577.910:91): prog-id=17 op=LOAD Oct 2 18:49:38.459881 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 18:49:38.459936 systemd[1]: Stopped iscsid.service. Oct 2 18:49:38.459972 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 18:49:38.460003 systemd[1]: Stopped initrd-switch-root.service. Oct 2 18:49:38.460090 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 18:49:38.460153 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 18:49:38.460190 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 18:49:38.460223 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 18:49:38.460255 systemd[1]: Created slice system-getty.slice. Oct 2 18:49:38.460288 systemd[1]: Created slice system-modprobe.slice. Oct 2 18:49:38.460322 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 18:49:38.460360 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 18:49:38.460393 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 18:49:38.460424 systemd[1]: Created slice user.slice. Oct 2 18:49:38.460455 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:49:38.460487 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 18:49:38.460517 systemd[1]: Set up automount boot.automount. Oct 2 18:49:38.460552 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 18:49:38.460585 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 18:49:38.460616 systemd[1]: Stopped target initrd-fs.target. Oct 2 18:49:38.460670 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 18:49:38.460707 systemd[1]: Reached target integritysetup.target. Oct 2 18:49:38.460739 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:49:38.460770 systemd[1]: Reached target remote-fs.target. Oct 2 18:49:38.460802 systemd[1]: Reached target slices.target. Oct 2 18:49:38.460832 systemd[1]: Reached target swap.target. Oct 2 18:49:38.460862 systemd[1]: Reached target torcx.target. Oct 2 18:49:38.460897 systemd[1]: Reached target veritysetup.target. Oct 2 18:49:38.460927 systemd[1]: Listening on systemd-coredump.socket. Oct 2 18:49:38.460958 systemd[1]: Listening on systemd-initctl.socket. Oct 2 18:49:38.460997 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:49:38.461030 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:49:38.461060 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:49:38.461115 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 18:49:38.461149 systemd[1]: Mounting dev-hugepages.mount... Oct 2 18:49:38.461179 systemd[1]: Mounting dev-mqueue.mount... Oct 2 18:49:38.461212 systemd[1]: Mounting media.mount... Oct 2 18:49:38.461242 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 18:49:38.461273 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 18:49:38.461307 systemd[1]: Mounting tmp.mount... Oct 2 18:49:38.461340 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 18:49:38.461370 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 18:49:38.461399 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:49:38.461431 systemd[1]: Starting modprobe@configfs.service... Oct 2 18:49:38.461464 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 18:49:38.461493 systemd[1]: Starting modprobe@drm.service... Oct 2 18:49:38.461523 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 18:49:38.461552 systemd[1]: Starting modprobe@fuse.service... Oct 2 18:49:38.461589 systemd[1]: Starting modprobe@loop.service... Oct 2 18:49:38.461621 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 18:49:38.461651 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 18:49:38.461683 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 18:49:38.461713 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 18:49:38.461746 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 18:49:38.461778 systemd[1]: Stopped systemd-journald.service. Oct 2 18:49:38.461810 systemd[1]: Starting systemd-journald.service... Oct 2 18:49:38.461840 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:49:38.461874 systemd[1]: Starting systemd-network-generator.service... Oct 2 18:49:38.461910 systemd[1]: Starting systemd-remount-fs.service... Oct 2 18:49:38.461940 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:49:38.461973 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 18:49:38.462003 systemd[1]: Stopped verity-setup.service. Oct 2 18:49:38.462033 systemd[1]: Mounted dev-hugepages.mount. Oct 2 18:49:38.462063 systemd[1]: Mounted dev-mqueue.mount. Oct 2 18:49:38.475194 systemd[1]: Mounted media.mount. Oct 2 18:49:38.475233 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 18:49:38.475272 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 18:49:38.475303 systemd[1]: Mounted tmp.mount. Oct 2 18:49:38.475334 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:49:38.475366 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 18:49:38.475396 systemd[1]: Finished modprobe@configfs.service. Oct 2 18:49:38.475430 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 18:49:38.475463 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 18:49:38.475493 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 18:49:38.475525 systemd[1]: Finished modprobe@drm.service. Oct 2 18:49:38.475555 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 18:49:38.475585 systemd[1]: Finished systemd-network-generator.service. Oct 2 18:49:38.475615 systemd[1]: Finished systemd-remount-fs.service. Oct 2 18:49:38.475645 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 18:49:38.475675 systemd[1]: Reached target network-pre.target. Oct 2 18:49:38.475710 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 18:49:38.475740 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 18:49:38.475771 systemd[1]: Starting systemd-random-seed.service... Oct 2 18:49:38.475801 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 18:49:38.475831 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 18:49:38.475864 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:49:38.475897 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 18:49:38.475927 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:49:38.475958 kernel: fuse: init (API version 7.34) Oct 2 18:49:38.475988 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 18:49:38.476018 systemd[1]: Finished modprobe@fuse.service. Oct 2 18:49:38.476050 kernel: loop: module loaded Oct 2 18:49:38.476108 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 18:49:38.476158 systemd-journald[1506]: Journal started Oct 2 18:49:38.476266 systemd-journald[1506]: Runtime Journal (/run/log/journal/ec25afb38fb639f84f808187153383fc) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:49:33.533000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 18:49:33.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:49:33.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:49:33.684000 audit: BPF prog-id=10 op=LOAD Oct 2 18:49:33.684000 audit: BPF prog-id=10 op=UNLOAD Oct 2 18:49:33.684000 audit: BPF prog-id=11 op=LOAD Oct 2 18:49:33.684000 audit: BPF prog-id=11 op=UNLOAD Oct 2 18:49:37.895000 audit: BPF prog-id=12 op=LOAD Oct 2 18:49:37.899000 audit: BPF prog-id=3 op=UNLOAD Oct 2 18:49:37.900000 audit: BPF prog-id=13 op=LOAD Oct 2 18:49:37.900000 audit: BPF prog-id=14 op=LOAD Oct 2 18:49:37.900000 audit: BPF prog-id=4 op=UNLOAD Oct 2 18:49:37.900000 audit: BPF prog-id=5 op=UNLOAD Oct 2 18:49:37.905000 audit: BPF prog-id=15 op=LOAD Oct 2 18:49:37.905000 audit: BPF prog-id=12 op=UNLOAD Oct 2 18:49:37.908000 audit: BPF prog-id=16 op=LOAD Oct 2 18:49:37.910000 audit: BPF prog-id=17 op=LOAD Oct 2 18:49:37.910000 audit: BPF prog-id=13 op=UNLOAD Oct 2 18:49:37.910000 audit: BPF prog-id=14 op=UNLOAD Oct 2 18:49:37.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.919000 audit: BPF prog-id=15 op=UNLOAD Oct 2 18:49:37.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.221000 audit: BPF prog-id=18 op=LOAD Oct 2 18:49:38.222000 audit: BPF prog-id=19 op=LOAD Oct 2 18:49:38.222000 audit: BPF prog-id=20 op=LOAD Oct 2 18:49:38.222000 audit: BPF prog-id=16 op=UNLOAD Oct 2 18:49:38.222000 audit: BPF prog-id=17 op=UNLOAD Oct 2 18:49:38.492393 systemd[1]: Started systemd-journald.service. Oct 2 18:49:38.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.429000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 18:49:38.429000 audit[1506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffff3275170 a2=4000 a3=1 items=0 ppid=1 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:38.429000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 18:49:38.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.893969 systemd[1]: Queued start job for default target multi-user.target. Oct 2 18:49:33.897045 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:49:37.912686 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 18:49:33.907652 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:49:38.487977 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 18:49:33.907710 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:49:38.488336 systemd[1]: Finished modprobe@loop.service. Oct 2 18:49:33.907778 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 18:49:38.490548 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 18:49:33.907804 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 18:49:38.494854 systemd[1]: Starting systemd-journal-flush.service... Oct 2 18:49:33.907869 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 18:49:38.496764 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 18:49:33.907901 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 18:49:33.908340 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 18:49:33.908418 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:49:33.908454 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:49:33.909350 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 18:49:33.909430 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 18:49:33.909474 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 18:49:33.909514 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 18:49:33.909559 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 18:49:33.909596 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 18:49:37.059895 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:37.060454 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:37.060718 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:38.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:37.061190 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:49:38.507754 systemd[1]: Finished systemd-random-seed.service. Oct 2 18:49:37.061295 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 18:49:38.509986 systemd[1]: Reached target first-boot-complete.target. Oct 2 18:49:37.061511 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T18:49:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 18:49:38.530910 systemd-journald[1506]: Time spent on flushing to /var/log/journal/ec25afb38fb639f84f808187153383fc is 64.728ms for 1144 entries. Oct 2 18:49:38.530910 systemd-journald[1506]: System Journal (/var/log/journal/ec25afb38fb639f84f808187153383fc) is 8.0M, max 195.6M, 187.6M free. Oct 2 18:49:38.624793 systemd-journald[1506]: Received client request to flush runtime journal. Oct 2 18:49:38.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.549619 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:49:38.627862 systemd[1]: Finished systemd-journal-flush.service. Oct 2 18:49:38.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:38.682170 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:49:38.684815 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 18:49:38.688973 systemd[1]: Starting systemd-sysusers.service... Oct 2 18:49:38.692993 systemd[1]: Starting systemd-udev-settle.service... Oct 2 18:49:38.728492 udevadm[1545]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 18:49:38.814837 systemd[1]: Finished systemd-sysusers.service. Oct 2 18:49:38.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:39.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:39.399000 audit: BPF prog-id=21 op=LOAD Oct 2 18:49:39.399000 audit: BPF prog-id=22 op=LOAD Oct 2 18:49:39.399000 audit: BPF prog-id=7 op=UNLOAD Oct 2 18:49:39.399000 audit: BPF prog-id=8 op=UNLOAD Oct 2 18:49:39.397602 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 18:49:39.401800 systemd[1]: Starting systemd-udevd.service... Oct 2 18:49:39.448684 systemd-udevd[1547]: Using default interface naming scheme 'v252'. Oct 2 18:49:39.511460 systemd[1]: Started systemd-udevd.service. Oct 2 18:49:39.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:39.513000 audit: BPF prog-id=23 op=LOAD Oct 2 18:49:39.520534 systemd[1]: Starting systemd-networkd.service... Oct 2 18:49:39.537000 audit: BPF prog-id=24 op=LOAD Oct 2 18:49:39.538000 audit: BPF prog-id=25 op=LOAD Oct 2 18:49:39.538000 audit: BPF prog-id=26 op=LOAD Oct 2 18:49:39.540478 systemd[1]: Starting systemd-userdbd.service... Oct 2 18:49:39.659232 systemd[1]: Started systemd-userdbd.service. Oct 2 18:49:39.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:39.741602 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 18:49:39.766993 (udev-worker)[1559]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:39.847515 systemd-networkd[1558]: lo: Link UP Oct 2 18:49:39.847536 systemd-networkd[1558]: lo: Gained carrier Oct 2 18:49:39.848747 systemd-networkd[1558]: Enumeration completed Oct 2 18:49:39.848929 systemd[1]: Started systemd-networkd.service. Oct 2 18:49:39.849022 systemd-networkd[1558]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:49:39.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:39.852975 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 18:49:39.860094 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:49:39.860838 systemd-networkd[1558]: eth0: Link UP Oct 2 18:49:39.861300 systemd-networkd[1558]: eth0: Gained carrier Oct 2 18:49:39.877440 systemd-networkd[1558]: eth0: DHCPv4 address 172.31.21.44/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:49:40.006154 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1571) Oct 2 18:49:40.210036 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:49:40.213014 systemd[1]: Finished systemd-udev-settle.service. Oct 2 18:49:40.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.217643 systemd[1]: Starting lvm2-activation-early.service... Oct 2 18:49:40.261607 lvm[1666]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:49:40.298865 systemd[1]: Finished lvm2-activation-early.service. Oct 2 18:49:40.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.301226 systemd[1]: Reached target cryptsetup.target. Oct 2 18:49:40.305299 systemd[1]: Starting lvm2-activation.service... Oct 2 18:49:40.319837 lvm[1667]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:49:40.358188 systemd[1]: Finished lvm2-activation.service. Oct 2 18:49:40.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.360225 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:49:40.362088 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 18:49:40.362331 systemd[1]: Reached target local-fs.target. Oct 2 18:49:40.364206 systemd[1]: Reached target machines.target. Oct 2 18:49:40.371242 systemd[1]: Starting ldconfig.service... Oct 2 18:49:40.373563 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 18:49:40.373872 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:40.377824 systemd[1]: Starting systemd-boot-update.service... Oct 2 18:49:40.382456 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 18:49:40.395603 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 18:49:40.398421 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:49:40.398535 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:49:40.402877 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 18:49:40.417752 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1669 (bootctl) Oct 2 18:49:40.420107 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 18:49:40.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.469972 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 18:49:40.492048 systemd-tmpfiles[1672]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 18:49:40.507969 systemd-tmpfiles[1672]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 18:49:40.516589 systemd-tmpfiles[1672]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 18:49:40.569007 systemd-fsck[1678]: fsck.fat 4.2 (2021-01-31) Oct 2 18:49:40.569007 systemd-fsck[1678]: /dev/nvme0n1p1: 236 files, 113463/258078 clusters Oct 2 18:49:40.577369 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 18:49:40.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.582263 systemd[1]: Mounting boot.mount... Oct 2 18:49:40.625477 systemd[1]: Mounted boot.mount. Oct 2 18:49:40.654478 systemd[1]: Finished systemd-boot-update.service. Oct 2 18:49:40.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.877130 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 18:49:40.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.881592 systemd[1]: Starting audit-rules.service... Oct 2 18:49:40.886659 systemd[1]: Starting clean-ca-certificates.service... Oct 2 18:49:40.890816 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 18:49:40.893000 audit: BPF prog-id=27 op=LOAD Oct 2 18:49:40.900000 audit: BPF prog-id=28 op=LOAD Oct 2 18:49:40.898483 systemd[1]: Starting systemd-resolved.service... Oct 2 18:49:40.903562 systemd[1]: Starting systemd-timesyncd.service... Oct 2 18:49:40.908980 systemd[1]: Starting systemd-update-utmp.service... Oct 2 18:49:40.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:40.970547 systemd[1]: Finished clean-ca-certificates.service. Oct 2 18:49:40.972693 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 18:49:40.995000 audit[1697]: SYSTEM_BOOT pid=1697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 18:49:41.003122 systemd[1]: Finished systemd-update-utmp.service. Oct 2 18:49:41.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:41.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:41.103884 systemd[1]: Started systemd-timesyncd.service. Oct 2 18:49:41.106003 systemd[1]: Reached target time-set.target. Oct 2 18:49:41.137864 systemd-resolved[1695]: Positive Trust Anchors: Oct 2 18:49:41.137891 systemd-resolved[1695]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:49:41.138001 systemd-resolved[1695]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:49:41.210106 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 18:49:41.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:41.249575 systemd-timesyncd[1696]: Contacted time server 208.113.130.146:123 (0.flatcar.pool.ntp.org). Oct 2 18:49:41.249804 systemd-timesyncd[1696]: Initial clock synchronization to Mon 2023-10-02 18:49:41.571318 UTC. Oct 2 18:49:41.343282 systemd-resolved[1695]: Defaulting to hostname 'linux'. Oct 2 18:49:41.347105 systemd[1]: Started systemd-resolved.service. Oct 2 18:49:41.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:41.349138 systemd[1]: Reached target network.target. Oct 2 18:49:41.350846 systemd[1]: Reached target nss-lookup.target. Oct 2 18:49:41.363000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 18:49:41.363000 audit[1713]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd30e2860 a2=420 a3=0 items=0 ppid=1692 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:41.363000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 18:49:41.365712 augenrules[1713]: No rules Oct 2 18:49:41.367583 systemd[1]: Finished audit-rules.service. Oct 2 18:49:41.606540 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 18:49:41.610128 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 18:49:41.618348 systemd-networkd[1558]: eth0: Gained IPv6LL Oct 2 18:49:41.622592 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 18:49:41.624896 systemd[1]: Reached target network-online.target. Oct 2 18:49:41.815789 ldconfig[1668]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 18:49:41.821957 systemd[1]: Finished ldconfig.service. Oct 2 18:49:41.825991 systemd[1]: Starting systemd-update-done.service... Oct 2 18:49:41.848456 systemd[1]: Finished systemd-update-done.service. Oct 2 18:49:41.850600 systemd[1]: Reached target sysinit.target. Oct 2 18:49:41.852461 systemd[1]: Started motdgen.path. Oct 2 18:49:41.853991 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 18:49:41.856457 systemd[1]: Started logrotate.timer. Oct 2 18:49:41.858256 systemd[1]: Started mdadm.timer. Oct 2 18:49:41.859784 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 18:49:41.861589 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 18:49:41.861635 systemd[1]: Reached target paths.target. Oct 2 18:49:41.863179 systemd[1]: Reached target timers.target. Oct 2 18:49:41.872129 systemd[1]: Listening on dbus.socket. Oct 2 18:49:41.875585 systemd[1]: Starting docker.socket... Oct 2 18:49:41.884299 systemd[1]: Listening on sshd.socket. Oct 2 18:49:41.886202 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:41.887032 systemd[1]: Listening on docker.socket. Oct 2 18:49:41.888848 systemd[1]: Reached target sockets.target. Oct 2 18:49:41.890545 systemd[1]: Reached target basic.target. Oct 2 18:49:41.892185 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:49:41.892234 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:49:41.894400 systemd[1]: Started amazon-ssm-agent.service. Oct 2 18:49:41.900374 systemd[1]: Starting containerd.service... Oct 2 18:49:41.909302 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 18:49:41.919569 systemd[1]: Starting dbus.service... Oct 2 18:49:41.928855 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 18:49:41.946235 systemd[1]: Starting extend-filesystems.service... Oct 2 18:49:41.949216 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 18:49:41.951660 systemd[1]: Starting motdgen.service... Oct 2 18:49:41.963239 systemd[1]: Started nvidia.service. Oct 2 18:49:41.968032 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 18:49:41.972872 systemd[1]: Starting prepare-critools.service... Oct 2 18:49:41.986580 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 18:49:41.991556 systemd[1]: Starting sshd-keygen.service... Oct 2 18:49:42.000333 systemd[1]: Starting systemd-logind.service... Oct 2 18:49:42.002047 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:49:42.002185 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 18:49:42.003804 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 18:49:42.005474 systemd[1]: Starting update-engine.service... Oct 2 18:49:42.011220 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 18:49:42.067056 jq[1727]: false Oct 2 18:49:42.078678 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 18:49:42.079095 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 18:49:42.158028 jq[1737]: true Oct 2 18:49:42.193847 dbus-daemon[1726]: [system] SELinux support is enabled Oct 2 18:49:42.195575 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 18:49:42.195948 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 18:49:42.206551 systemd[1]: Started dbus.service. Oct 2 18:49:42.211677 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 18:49:42.211744 systemd[1]: Reached target system-config.target. Oct 2 18:49:42.213844 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 18:49:42.213891 systemd[1]: Reached target user-config.target. Oct 2 18:49:42.223853 tar[1745]: ./ Oct 2 18:49:42.223853 tar[1745]: ./loopback Oct 2 18:49:42.236271 dbus-daemon[1726]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1558 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 18:49:42.238758 tar[1744]: crictl Oct 2 18:49:42.247069 jq[1747]: true Oct 2 18:49:42.248276 dbus-daemon[1726]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 18:49:42.278920 systemd[1]: Starting systemd-hostnamed.service... Oct 2 18:49:42.304766 extend-filesystems[1728]: Found nvme0n1 Oct 2 18:49:42.307506 extend-filesystems[1728]: Found nvme0n1p1 Oct 2 18:49:42.312648 extend-filesystems[1728]: Found nvme0n1p2 Oct 2 18:49:42.319367 extend-filesystems[1728]: Found nvme0n1p3 Oct 2 18:49:42.323347 extend-filesystems[1728]: Found usr Oct 2 18:49:42.325270 extend-filesystems[1728]: Found nvme0n1p4 Oct 2 18:49:42.329351 extend-filesystems[1728]: Found nvme0n1p6 Oct 2 18:49:42.331506 extend-filesystems[1728]: Found nvme0n1p7 Oct 2 18:49:42.333934 extend-filesystems[1728]: Found nvme0n1p9 Oct 2 18:49:42.336655 extend-filesystems[1728]: Checking size of /dev/nvme0n1p9 Oct 2 18:49:42.366293 systemd[1]: Created slice system-sshd.slice. Oct 2 18:49:42.442038 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 18:49:42.442499 systemd[1]: Finished motdgen.service. Oct 2 18:49:42.457435 amazon-ssm-agent[1723]: 2023/10/02 18:49:42 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 18:49:42.463045 update_engine[1736]: I1002 18:49:42.462527 1736 main.cc:92] Flatcar Update Engine starting Oct 2 18:49:42.469284 amazon-ssm-agent[1723]: Initializing new seelog logger Oct 2 18:49:42.469533 amazon-ssm-agent[1723]: New Seelog Logger Creation Complete Oct 2 18:49:42.469746 amazon-ssm-agent[1723]: 2023/10/02 18:49:42 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:49:42.469746 amazon-ssm-agent[1723]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:49:42.470042 extend-filesystems[1728]: Resized partition /dev/nvme0n1p9 Oct 2 18:49:42.472366 amazon-ssm-agent[1723]: 2023/10/02 18:49:42 processing appconfig overrides Oct 2 18:49:42.478297 systemd[1]: Started update-engine.service. Oct 2 18:49:42.480220 update_engine[1736]: I1002 18:49:42.480180 1736 update_check_scheduler.cc:74] Next update check in 3m43s Oct 2 18:49:42.483228 systemd[1]: Started locksmithd.service. Oct 2 18:49:42.487736 extend-filesystems[1784]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 18:49:42.515218 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 18:49:42.572211 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 18:49:42.604425 extend-filesystems[1784]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 18:49:42.604425 extend-filesystems[1784]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 18:49:42.604425 extend-filesystems[1784]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 18:49:42.613278 extend-filesystems[1728]: Resized filesystem in /dev/nvme0n1p9 Oct 2 18:49:42.614007 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 18:49:42.614432 systemd[1]: Finished extend-filesystems.service. Oct 2 18:49:42.713002 bash[1809]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:49:42.714453 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 18:49:42.714811 systemd-logind[1735]: Watching system buttons on /dev/input/event0 (Power Button) Oct 2 18:49:42.722600 systemd-logind[1735]: New seat seat0. Oct 2 18:49:42.740438 systemd[1]: Started systemd-logind.service. Oct 2 18:49:42.778587 tar[1745]: ./bandwidth Oct 2 18:49:42.824626 env[1739]: time="2023-10-02T18:49:42.824544614Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 18:49:42.839888 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 18:49:42.967781 dbus-daemon[1726]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 18:49:42.968036 systemd[1]: Started systemd-hostnamed.service. Oct 2 18:49:42.973258 dbus-daemon[1726]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1763 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 18:49:42.978203 systemd[1]: Starting polkit.service... Oct 2 18:49:43.034809 env[1739]: time="2023-10-02T18:49:43.034724592Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 18:49:43.035049 env[1739]: time="2023-10-02T18:49:43.035000882Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.038980 polkitd[1821]: Started polkitd version 121 Oct 2 18:49:43.044670 env[1739]: time="2023-10-02T18:49:43.044444077Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:43.044670 env[1739]: time="2023-10-02T18:49:43.044516438Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.044975 env[1739]: time="2023-10-02T18:49:43.044941699Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:43.045045 env[1739]: time="2023-10-02T18:49:43.044982669Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.045045 env[1739]: time="2023-10-02T18:49:43.045016073Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 18:49:43.045195 env[1739]: time="2023-10-02T18:49:43.045041738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.045308 env[1739]: time="2023-10-02T18:49:43.045256947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.046184 env[1739]: time="2023-10-02T18:49:43.045947790Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:49:43.046325 env[1739]: time="2023-10-02T18:49:43.046269447Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:49:43.046396 env[1739]: time="2023-10-02T18:49:43.046323312Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 18:49:43.046570 env[1739]: time="2023-10-02T18:49:43.046459860Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 18:49:43.046570 env[1739]: time="2023-10-02T18:49:43.046498022Z" level=info msg="metadata content store policy set" policy=shared Oct 2 18:49:43.065431 env[1739]: time="2023-10-02T18:49:43.065356261Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 18:49:43.065607 env[1739]: time="2023-10-02T18:49:43.065435766Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 18:49:43.065607 env[1739]: time="2023-10-02T18:49:43.065470189Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 18:49:43.065607 env[1739]: time="2023-10-02T18:49:43.065560302Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.065607 env[1739]: time="2023-10-02T18:49:43.065597346Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.065857 env[1739]: time="2023-10-02T18:49:43.065632291Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.065857 env[1739]: time="2023-10-02T18:49:43.065664378Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.066341 env[1739]: time="2023-10-02T18:49:43.066221257Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.066341 env[1739]: time="2023-10-02T18:49:43.066281344Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.066341 env[1739]: time="2023-10-02T18:49:43.066317258Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.066550 env[1739]: time="2023-10-02T18:49:43.066348849Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.066550 env[1739]: time="2023-10-02T18:49:43.066379383Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 18:49:43.066663 env[1739]: time="2023-10-02T18:49:43.066607474Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 18:49:43.066832 env[1739]: time="2023-10-02T18:49:43.066784433Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 18:49:43.067258 env[1739]: time="2023-10-02T18:49:43.067212366Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067275770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067312926Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067482034Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067519973Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067552209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067597 env[1739]: time="2023-10-02T18:49:43.067582272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067948 env[1739]: time="2023-10-02T18:49:43.067614769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067948 env[1739]: time="2023-10-02T18:49:43.067645403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067948 env[1739]: time="2023-10-02T18:49:43.067675528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067948 env[1739]: time="2023-10-02T18:49:43.067706672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.067948 env[1739]: time="2023-10-02T18:49:43.067740473Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 18:49:43.068321 env[1739]: time="2023-10-02T18:49:43.068025757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.068321 env[1739]: time="2023-10-02T18:49:43.068061770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.076210 tar[1745]: ./ptp Oct 2 18:49:43.077630 env[1739]: time="2023-10-02T18:49:43.068094628Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.077934 env[1739]: time="2023-10-02T18:49:43.077624519Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 18:49:43.077934 env[1739]: time="2023-10-02T18:49:43.077670806Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 18:49:43.077934 env[1739]: time="2023-10-02T18:49:43.077699788Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 18:49:43.077934 env[1739]: time="2023-10-02T18:49:43.077738720Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 18:49:43.077934 env[1739]: time="2023-10-02T18:49:43.077809528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 18:49:43.078519 env[1739]: time="2023-10-02T18:49:43.078404855Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 18:49:43.079733 env[1739]: time="2023-10-02T18:49:43.078520857Z" level=info msg="Connect containerd service" Oct 2 18:49:43.079733 env[1739]: time="2023-10-02T18:49:43.078585218Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 18:49:43.079913 env[1739]: time="2023-10-02T18:49:43.079788976Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:49:43.080444 env[1739]: time="2023-10-02T18:49:43.080386414Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 18:49:43.080603 env[1739]: time="2023-10-02T18:49:43.080502180Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 18:49:43.080708 systemd[1]: Started containerd.service. Oct 2 18:49:43.082354 polkitd[1821]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 18:49:43.083243 polkitd[1821]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 18:49:43.084225 coreos-metadata[1725]: Oct 02 18:49:43.078 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 18:49:43.086077 polkitd[1821]: Finished loading, compiling and executing 2 rules Oct 2 18:49:43.087609 dbus-daemon[1726]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 18:49:43.087882 systemd[1]: Started polkit.service. Oct 2 18:49:43.091201 coreos-metadata[1725]: Oct 02 18:49:43.086 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 18:49:43.092630 coreos-metadata[1725]: Oct 02 18:49:43.092 INFO Fetch successful Oct 2 18:49:43.092958 coreos-metadata[1725]: Oct 02 18:49:43.092 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 18:49:43.093769 polkitd[1821]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 18:49:43.094558 env[1739]: time="2023-10-02T18:49:43.094492888Z" level=info msg="containerd successfully booted in 0.298541s" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.095847928Z" level=info msg="Start subscribing containerd event" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.096703134Z" level=info msg="Start recovering state" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.096867150Z" level=info msg="Start event monitor" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.097032320Z" level=info msg="Start snapshots syncer" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.097064395Z" level=info msg="Start cni network conf syncer for default" Oct 2 18:49:43.097936 env[1739]: time="2023-10-02T18:49:43.097096470Z" level=info msg="Start streaming server" Oct 2 18:49:43.102667 coreos-metadata[1725]: Oct 02 18:49:43.101 INFO Fetch successful Oct 2 18:49:43.108006 unknown[1725]: wrote ssh authorized keys file for user: core Oct 2 18:49:43.151780 systemd-resolved[1695]: System hostname changed to 'ip-172-31-21-44'. Oct 2 18:49:43.151781 systemd-hostnamed[1763]: Hostname set to (transient) Oct 2 18:49:43.171492 update-ssh-keys[1833]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:49:43.172648 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 18:49:43.239135 amazon-ssm-agent[1723]: 2023-10-02 18:49:43 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-01fa1336604a024de is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-01fa1336604a024de because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 18:49:43.239135 amazon-ssm-agent[1723]: status code: 400, request id: 1ccb3563-d811-4705-9525-c9a61e2422db Oct 2 18:49:43.239135 amazon-ssm-agent[1723]: 2023-10-02 18:49:43 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 18:49:43.315714 tar[1745]: ./vlan Oct 2 18:49:43.436705 tar[1745]: ./host-device Oct 2 18:49:43.546944 tar[1745]: ./tuning Oct 2 18:49:43.660702 tar[1745]: ./vrf Oct 2 18:49:43.806600 tar[1745]: ./sbr Oct 2 18:49:43.941796 tar[1745]: ./tap Oct 2 18:49:44.055826 tar[1745]: ./dhcp Oct 2 18:49:44.331020 tar[1745]: ./static Oct 2 18:49:44.398459 systemd[1]: Finished prepare-critools.service. Oct 2 18:49:44.407973 tar[1745]: ./firewall Oct 2 18:49:44.467018 tar[1745]: ./macvlan Oct 2 18:49:44.520713 tar[1745]: ./dummy Oct 2 18:49:44.573512 tar[1745]: ./bridge Oct 2 18:49:44.630847 tar[1745]: ./ipvlan Oct 2 18:49:44.682381 tar[1745]: ./portmap Oct 2 18:49:44.731733 tar[1745]: ./host-local Oct 2 18:49:44.806155 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 18:49:44.890514 locksmithd[1785]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 18:49:51.622618 sshd_keygen[1764]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 18:49:51.681568 systemd[1]: Finished sshd-keygen.service. Oct 2 18:49:51.686503 systemd[1]: Starting issuegen.service... Oct 2 18:49:51.690574 systemd[1]: Started sshd@0-172.31.21.44:22-139.178.89.65:50464.service. Oct 2 18:49:51.708993 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 18:49:51.709386 systemd[1]: Finished issuegen.service. Oct 2 18:49:51.714195 systemd[1]: Starting systemd-user-sessions.service... Oct 2 18:49:51.738437 systemd[1]: Finished systemd-user-sessions.service. Oct 2 18:49:51.743192 systemd[1]: Started getty@tty1.service. Oct 2 18:49:51.747916 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 18:49:51.751700 systemd[1]: Reached target getty.target. Oct 2 18:49:51.753837 systemd[1]: Reached target multi-user.target. Oct 2 18:49:51.758460 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 18:49:51.782968 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 18:49:51.783339 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 18:49:51.785754 systemd[1]: Startup finished in 1.181s (kernel) + 13.763s (initrd) + 18.421s (userspace) = 33.366s. Oct 2 18:49:51.904224 sshd[1927]: Accepted publickey for core from 139.178.89.65 port 50464 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:51.909016 sshd[1927]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:51.927526 systemd[1]: Created slice user-500.slice. Oct 2 18:49:51.930392 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 18:49:51.941248 systemd-logind[1735]: New session 1 of user core. Oct 2 18:49:51.955758 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 18:49:51.960939 systemd[1]: Starting user@500.service... Oct 2 18:49:51.972226 (systemd)[1936]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:52.175287 systemd[1936]: Queued start job for default target default.target. Oct 2 18:49:52.177146 systemd[1936]: Reached target paths.target. Oct 2 18:49:52.177201 systemd[1936]: Reached target sockets.target. Oct 2 18:49:52.177233 systemd[1936]: Reached target timers.target. Oct 2 18:49:52.177263 systemd[1936]: Reached target basic.target. Oct 2 18:49:52.177361 systemd[1936]: Reached target default.target. Oct 2 18:49:52.177427 systemd[1936]: Startup finished in 187ms. Oct 2 18:49:52.177907 systemd[1]: Started user@500.service. Oct 2 18:49:52.179969 systemd[1]: Started session-1.scope. Oct 2 18:49:52.341960 systemd[1]: Started sshd@1-172.31.21.44:22-139.178.89.65:51404.service. Oct 2 18:49:52.521807 sshd[1945]: Accepted publickey for core from 139.178.89.65 port 51404 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:52.525155 sshd[1945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:52.534054 systemd-logind[1735]: New session 2 of user core. Oct 2 18:49:52.534974 systemd[1]: Started session-2.scope. Oct 2 18:49:52.685888 sshd[1945]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:52.692651 systemd-logind[1735]: Session 2 logged out. Waiting for processes to exit. Oct 2 18:49:52.693282 systemd[1]: sshd@1-172.31.21.44:22-139.178.89.65:51404.service: Deactivated successfully. Oct 2 18:49:52.694514 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 18:49:52.696046 systemd-logind[1735]: Removed session 2. Oct 2 18:49:52.716922 systemd[1]: Started sshd@2-172.31.21.44:22-139.178.89.65:51412.service. Oct 2 18:49:52.896787 sshd[1951]: Accepted publickey for core from 139.178.89.65 port 51412 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:52.899581 sshd[1951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:52.908234 systemd-logind[1735]: New session 3 of user core. Oct 2 18:49:52.908742 systemd[1]: Started session-3.scope. Oct 2 18:49:53.043466 sshd[1951]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:53.049219 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 18:49:53.050296 systemd[1]: sshd@2-172.31.21.44:22-139.178.89.65:51412.service: Deactivated successfully. Oct 2 18:49:53.051832 systemd-logind[1735]: Session 3 logged out. Waiting for processes to exit. Oct 2 18:49:53.054190 systemd-logind[1735]: Removed session 3. Oct 2 18:49:53.075523 systemd[1]: Started sshd@3-172.31.21.44:22-139.178.89.65:51420.service. Oct 2 18:49:53.252200 sshd[1957]: Accepted publickey for core from 139.178.89.65 port 51420 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:53.254989 sshd[1957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:53.265183 systemd-logind[1735]: New session 4 of user core. Oct 2 18:49:53.265684 systemd[1]: Started session-4.scope. Oct 2 18:49:53.412234 sshd[1957]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:53.417837 systemd[1]: sshd@3-172.31.21.44:22-139.178.89.65:51420.service: Deactivated successfully. Oct 2 18:49:53.419039 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 18:49:53.420871 systemd-logind[1735]: Session 4 logged out. Waiting for processes to exit. Oct 2 18:49:53.422791 systemd-logind[1735]: Removed session 4. Oct 2 18:49:53.444936 systemd[1]: Started sshd@4-172.31.21.44:22-139.178.89.65:51424.service. Oct 2 18:49:53.621185 sshd[1963]: Accepted publickey for core from 139.178.89.65 port 51424 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:53.624019 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:53.633336 systemd[1]: Started session-5.scope. Oct 2 18:49:53.634147 systemd-logind[1735]: New session 5 of user core. Oct 2 18:49:53.763856 sudo[1966]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 18:49:53.764417 sudo[1966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:53.779362 dbus-daemon[1726]: avc: received setenforce notice (enforcing=1) Oct 2 18:49:53.782853 sudo[1966]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:53.807158 sshd[1963]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:53.812911 systemd[1]: sshd@4-172.31.21.44:22-139.178.89.65:51424.service: Deactivated successfully. Oct 2 18:49:53.814383 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 18:49:53.815542 systemd-logind[1735]: Session 5 logged out. Waiting for processes to exit. Oct 2 18:49:53.817045 systemd-logind[1735]: Removed session 5. Oct 2 18:49:53.837668 systemd[1]: Started sshd@5-172.31.21.44:22-139.178.89.65:51430.service. Oct 2 18:49:54.017164 sshd[1970]: Accepted publickey for core from 139.178.89.65 port 51430 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:54.021032 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:54.030319 systemd[1]: Started session-6.scope. Oct 2 18:49:54.031039 systemd-logind[1735]: New session 6 of user core. Oct 2 18:49:54.152202 sudo[1974]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 18:49:54.152844 sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:54.160396 sudo[1974]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:54.174233 sudo[1973]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 18:49:54.174726 sudo[1973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:54.198891 systemd[1]: Stopping audit-rules.service... Oct 2 18:49:54.203000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:49:54.206311 kernel: kauditd_printk_skb: 74 callbacks suppressed Oct 2 18:49:54.206365 kernel: audit: type=1305 audit(1696272594.203:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:49:54.203000 audit[1977]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd94b5790 a2=420 a3=0 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:54.222725 kernel: audit: type=1300 audit(1696272594.203:162): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd94b5790 a2=420 a3=0 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:54.222800 kernel: audit: type=1327 audit(1696272594.203:162): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:49:54.203000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:49:54.226552 auditctl[1977]: No rules Oct 2 18:49:54.227556 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 18:49:54.227891 systemd[1]: Stopped audit-rules.service. Oct 2 18:49:54.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.234436 systemd[1]: Starting audit-rules.service... Oct 2 18:49:54.237120 kernel: audit: type=1131 audit(1696272594.226:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.297763 augenrules[1994]: No rules Oct 2 18:49:54.299912 systemd[1]: Finished audit-rules.service. Oct 2 18:49:54.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.308678 sudo[1973]: pam_unix(sudo:session): session closed for user root Oct 2 18:49:54.308000 audit[1973]: USER_END pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.318458 kernel: audit: type=1130 audit(1696272594.299:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.318537 kernel: audit: type=1106 audit(1696272594.308:165): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.308000 audit[1973]: CRED_DISP pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.328106 kernel: audit: type=1104 audit(1696272594.308:166): pid=1973 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.340454 sshd[1970]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:54.341000 audit[1970]: USER_END pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.355392 systemd[1]: sshd@5-172.31.21.44:22-139.178.89.65:51430.service: Deactivated successfully. Oct 2 18:49:54.342000 audit[1970]: CRED_DISP pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.365205 kernel: audit: type=1106 audit(1696272594.341:167): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.365297 kernel: audit: type=1104 audit(1696272594.342:168): pid=1970 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.356615 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 18:49:54.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.44:22-139.178.89.65:51430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.374656 kernel: audit: type=1131 audit(1696272594.354:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.44:22-139.178.89.65:51430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.375379 systemd-logind[1735]: Session 6 logged out. Waiting for processes to exit. Oct 2 18:49:54.385266 systemd[1]: Started sshd@6-172.31.21.44:22-139.178.89.65:51446.service. Oct 2 18:49:54.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.44:22-139.178.89.65:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.388463 systemd-logind[1735]: Removed session 6. Oct 2 18:49:54.560000 audit[2000]: USER_ACCT pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.561893 sshd[2000]: Accepted publickey for core from 139.178.89.65 port 51446 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:54.563000 audit[2000]: CRED_ACQ pid=2000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.563000 audit[2000]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebf230a0 a2=3 a3=1 items=0 ppid=1 pid=2000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:54.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:49:54.564754 sshd[2000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:54.573976 systemd[1]: Started session-7.scope. Oct 2 18:49:54.576228 systemd-logind[1735]: New session 7 of user core. Oct 2 18:49:54.584000 audit[2000]: USER_START pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.591000 audit[2002]: CRED_ACQ pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:54.695000 audit[2003]: USER_ACCT pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.697008 sudo[2003]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 18:49:54.696000 audit[2003]: CRED_REFR pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:54.698183 sudo[2003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:49:54.700000 audit[2003]: USER_START pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:49:55.434051 systemd[1]: Starting docker.service... Oct 2 18:49:55.547780 env[2018]: time="2023-10-02T18:49:55.547680479Z" level=info msg="Starting up" Oct 2 18:49:55.551877 env[2018]: time="2023-10-02T18:49:55.551828584Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:49:55.552054 env[2018]: time="2023-10-02T18:49:55.552023722Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:49:55.552225 env[2018]: time="2023-10-02T18:49:55.552188116Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:49:55.552337 env[2018]: time="2023-10-02T18:49:55.552309124Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:49:55.557680 env[2018]: time="2023-10-02T18:49:55.557604784Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:49:55.557680 env[2018]: time="2023-10-02T18:49:55.557655783Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:49:55.558004 env[2018]: time="2023-10-02T18:49:55.557700280Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:49:55.558004 env[2018]: time="2023-10-02T18:49:55.557725321Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:49:55.572252 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1607554228-merged.mount: Deactivated successfully. Oct 2 18:49:55.611987 env[2018]: time="2023-10-02T18:49:55.611863607Z" level=info msg="Loading containers: start." Oct 2 18:49:55.724000 audit[2049]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.724000 audit[2049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff069c9a0 a2=0 a3=1 items=0 ppid=2018 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 18:49:55.731000 audit[2051]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.731000 audit[2051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcb35cc10 a2=0 a3=1 items=0 ppid=2018 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 18:49:55.738000 audit[2053]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.738000 audit[2053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffc41f8c0 a2=0 a3=1 items=0 ppid=2018 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:49:55.745000 audit[2055]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.745000 audit[2055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff23ca2f0 a2=0 a3=1 items=0 ppid=2018 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:49:55.754000 audit[2057]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.754000 audit[2057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde650b30 a2=0 a3=1 items=0 ppid=2018 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 18:49:55.789000 audit[2062]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.789000 audit[2062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc981040 a2=0 a3=1 items=0 ppid=2018 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 18:49:55.804000 audit[2064]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.804000 audit[2064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1db1df0 a2=0 a3=1 items=0 ppid=2018 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 18:49:55.811000 audit[2066]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.811000 audit[2066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff8a4fd90 a2=0 a3=1 items=0 ppid=2018 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 18:49:55.818000 audit[2068]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.818000 audit[2068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffebabf470 a2=0 a3=1 items=0 ppid=2018 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:55.839000 audit[2072]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.839000 audit[2072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc0cfe180 a2=0 a3=1 items=0 ppid=2018 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.839000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:55.842000 audit[2073]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.842000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdacd7a20 a2=0 a3=1 items=0 ppid=2018 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:55.857152 kernel: Initializing XFRM netlink socket Oct 2 18:49:55.901783 env[2018]: time="2023-10-02T18:49:55.901725275Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 18:49:55.906415 (udev-worker)[2029]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:55.936000 audit[2082]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.936000 audit[2082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc08ab1a0 a2=0 a3=1 items=0 ppid=2018 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.936000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 18:49:55.961000 audit[2085]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.961000 audit[2085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc4cd4d70 a2=0 a3=1 items=0 ppid=2018 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 18:49:55.973000 audit[2088]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.973000 audit[2088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff1cb7000 a2=0 a3=1 items=0 ppid=2018 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 18:49:55.980000 audit[2090]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.980000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff4154b00 a2=0 a3=1 items=0 ppid=2018 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 18:49:55.989000 audit[2092]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.989000 audit[2092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffe4e6990 a2=0 a3=1 items=0 ppid=2018 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 18:49:55.997000 audit[2094]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:55.997000 audit[2094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe83cd1d0 a2=0 a3=1 items=0 ppid=2018 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:55.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 18:49:56.006000 audit[2096]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.006000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd1f5d710 a2=0 a3=1 items=0 ppid=2018 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 18:49:56.025000 audit[2099]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.025000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd59a4d20 a2=0 a3=1 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 18:49:56.033000 audit[2101]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.033000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe4c78ab0 a2=0 a3=1 items=0 ppid=2018 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.033000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:49:56.040000 audit[2103]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.040000 audit[2103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffdc3db6b0 a2=0 a3=1 items=0 ppid=2018 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.040000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:49:56.047000 audit[2105]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.047000 audit[2105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff22ed6a0 a2=0 a3=1 items=0 ppid=2018 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 18:49:56.049994 systemd-networkd[1558]: docker0: Link UP Oct 2 18:49:56.071000 audit[2109]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.071000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd825c80 a2=0 a3=1 items=0 ppid=2018 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:56.074000 audit[2110]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:49:56.074000 audit[2110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff2abdcd0 a2=0 a3=1 items=0 ppid=2018 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:56.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:49:56.075386 env[2018]: time="2023-10-02T18:49:56.075327143Z" level=info msg="Loading containers: done." Oct 2 18:49:56.110132 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1375830394-merged.mount: Deactivated successfully. Oct 2 18:49:56.129227 env[2018]: time="2023-10-02T18:49:56.129145853Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 18:49:56.129996 env[2018]: time="2023-10-02T18:49:56.129963415Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 18:49:56.130450 env[2018]: time="2023-10-02T18:49:56.130395090Z" level=info msg="Daemon has completed initialization" Oct 2 18:49:56.163619 systemd[1]: Started docker.service. Oct 2 18:49:56.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:56.180167 env[2018]: time="2023-10-02T18:49:56.179955894Z" level=info msg="API listen on /run/docker.sock" Oct 2 18:49:56.233000 systemd[1]: Reloading. Oct 2 18:49:56.388861 /usr/lib/systemd/system-generators/torcx-generator[2156]: time="2023-10-02T18:49:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:49:56.391397 /usr/lib/systemd/system-generators/torcx-generator[2156]: time="2023-10-02T18:49:56Z" level=info msg="torcx already run" Oct 2 18:49:56.644155 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:49:56.644198 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:49:56.682347 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit: BPF prog-id=37 op=LOAD Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.845000 audit: BPF prog-id=38 op=LOAD Oct 2 18:49:56.845000 audit: BPF prog-id=21 op=UNLOAD Oct 2 18:49:56.845000 audit: BPF prog-id=22 op=UNLOAD Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit: BPF prog-id=39 op=LOAD Oct 2 18:49:56.847000 audit: BPF prog-id=32 op=UNLOAD Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit: BPF prog-id=40 op=LOAD Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.847000 audit: BPF prog-id=41 op=LOAD Oct 2 18:49:56.847000 audit: BPF prog-id=33 op=UNLOAD Oct 2 18:49:56.847000 audit: BPF prog-id=34 op=UNLOAD Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.848000 audit: BPF prog-id=42 op=LOAD Oct 2 18:49:56.848000 audit: BPF prog-id=23 op=UNLOAD Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.852000 audit: BPF prog-id=43 op=LOAD Oct 2 18:49:56.852000 audit: BPF prog-id=35 op=UNLOAD Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.854000 audit: BPF prog-id=44 op=LOAD Oct 2 18:49:56.854000 audit: BPF prog-id=27 op=UNLOAD Oct 2 18:49:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit: BPF prog-id=45 op=LOAD Oct 2 18:49:56.857000 audit: BPF prog-id=24 op=UNLOAD Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit: BPF prog-id=46 op=LOAD Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.857000 audit: BPF prog-id=47 op=LOAD Oct 2 18:49:56.857000 audit: BPF prog-id=25 op=UNLOAD Oct 2 18:49:56.858000 audit: BPF prog-id=26 op=UNLOAD Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.863000 audit: BPF prog-id=48 op=LOAD Oct 2 18:49:56.863000 audit: BPF prog-id=28 op=UNLOAD Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit: BPF prog-id=49 op=LOAD Oct 2 18:49:56.865000 audit: BPF prog-id=29 op=UNLOAD Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit: BPF prog-id=50 op=LOAD Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.866000 audit: BPF prog-id=51 op=LOAD Oct 2 18:49:56.866000 audit: BPF prog-id=30 op=UNLOAD Oct 2 18:49:56.866000 audit: BPF prog-id=31 op=UNLOAD Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit: BPF prog-id=52 op=LOAD Oct 2 18:49:56.868000 audit: BPF prog-id=18 op=UNLOAD Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit: BPF prog-id=53 op=LOAD Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:56.869000 audit: BPF prog-id=54 op=LOAD Oct 2 18:49:56.869000 audit: BPF prog-id=19 op=UNLOAD Oct 2 18:49:56.869000 audit: BPF prog-id=20 op=UNLOAD Oct 2 18:49:56.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:56.889741 systemd[1]: Started kubelet.service. Oct 2 18:49:57.055205 kubelet[2211]: E1002 18:49:57.054282 2211 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 18:49:57.062658 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:49:57.062981 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:49:57.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:49:57.323141 env[1739]: time="2023-10-02T18:49:57.322978304Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 18:49:57.940064 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3387096691.mount: Deactivated successfully. Oct 2 18:50:00.177999 env[1739]: time="2023-10-02T18:50:00.177917317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.181582 env[1739]: time="2023-10-02T18:50:00.181518165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.184891 env[1739]: time="2023-10-02T18:50:00.184801361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.188236 env[1739]: time="2023-10-02T18:50:00.188181099Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:00.189746 env[1739]: time="2023-10-02T18:50:00.189696215Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c\"" Oct 2 18:50:00.218974 env[1739]: time="2023-10-02T18:50:00.218913927Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 18:50:02.535642 env[1739]: time="2023-10-02T18:50:02.535578099Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:02.538737 env[1739]: time="2023-10-02T18:50:02.538665105Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:02.543840 env[1739]: time="2023-10-02T18:50:02.543774400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:02.547887 env[1739]: time="2023-10-02T18:50:02.547812515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:02.550383 env[1739]: time="2023-10-02T18:50:02.550335563Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c\"" Oct 2 18:50:02.581099 env[1739]: time="2023-10-02T18:50:02.581011946Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 18:50:04.057174 env[1739]: time="2023-10-02T18:50:04.057063458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:04.060893 env[1739]: time="2023-10-02T18:50:04.060830919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:04.064178 env[1739]: time="2023-10-02T18:50:04.064116538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:04.067671 env[1739]: time="2023-10-02T18:50:04.067607735Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:04.069175 env[1739]: time="2023-10-02T18:50:04.069125353Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7\"" Oct 2 18:50:04.097500 env[1739]: time="2023-10-02T18:50:04.097449199Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 18:50:05.331218 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1587978422.mount: Deactivated successfully. Oct 2 18:50:06.131499 env[1739]: time="2023-10-02T18:50:06.131414311Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.135678 env[1739]: time="2023-10-02T18:50:06.135605483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.139152 env[1739]: time="2023-10-02T18:50:06.139063567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.142893 env[1739]: time="2023-10-02T18:50:06.142835772Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.145142 env[1739]: time="2023-10-02T18:50:06.144049787Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa\"" Oct 2 18:50:06.175333 env[1739]: time="2023-10-02T18:50:06.175259041Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 18:50:06.685021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount684423695.mount: Deactivated successfully. Oct 2 18:50:06.695699 env[1739]: time="2023-10-02T18:50:06.695643889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.699337 env[1739]: time="2023-10-02T18:50:06.699287604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.702034 env[1739]: time="2023-10-02T18:50:06.701987685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.704638 env[1739]: time="2023-10-02T18:50:06.704576958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:06.705842 env[1739]: time="2023-10-02T18:50:06.705778027Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 18:50:06.734831 env[1739]: time="2023-10-02T18:50:06.734780413Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 18:50:07.314388 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 18:50:07.314796 systemd[1]: Stopped kubelet.service. Oct 2 18:50:07.326226 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 18:50:07.326398 kernel: audit: type=1130 audit(1696272607.313:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.317863 systemd[1]: Started kubelet.service. Oct 2 18:50:07.336834 kernel: audit: type=1131 audit(1696272607.313:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.347414 kernel: audit: type=1130 audit(1696272607.317:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:07.542373 kubelet[2256]: E1002 18:50:07.542307 2256 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 18:50:07.550101 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:50:07.550425 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:50:07.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:07.560110 kernel: audit: type=1131 audit(1696272607.549:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:11.386690 env[1739]: time="2023-10-02T18:50:11.386617515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:11.389956 env[1739]: time="2023-10-02T18:50:11.389889436Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:11.395859 env[1739]: time="2023-10-02T18:50:11.393933148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:11.399155 env[1739]: time="2023-10-02T18:50:11.398268475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:11.400291 env[1739]: time="2023-10-02T18:50:11.400245713Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Oct 2 18:50:11.435365 env[1739]: time="2023-10-02T18:50:11.435303935Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 18:50:11.983731 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3841514953.mount: Deactivated successfully. Oct 2 18:50:12.991025 env[1739]: time="2023-10-02T18:50:12.990942223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:12.993771 env[1739]: time="2023-10-02T18:50:12.993708268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:12.996599 env[1739]: time="2023-10-02T18:50:12.996536183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:12.998947 env[1739]: time="2023-10-02T18:50:12.998879266Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:13.000596 env[1739]: time="2023-10-02T18:50:13.000538305Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 18:50:13.185775 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 18:50:13.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.196144 kernel: audit: type=1131 audit(1696272613.186:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:13.215000 audit: BPF prog-id=41 op=UNLOAD Oct 2 18:50:13.215000 audit: BPF prog-id=40 op=UNLOAD Oct 2 18:50:13.220596 kernel: audit: type=1334 audit(1696272613.215:417): prog-id=41 op=UNLOAD Oct 2 18:50:13.220725 kernel: audit: type=1334 audit(1696272613.215:418): prog-id=40 op=UNLOAD Oct 2 18:50:13.220782 kernel: audit: type=1334 audit(1696272613.215:419): prog-id=39 op=UNLOAD Oct 2 18:50:13.215000 audit: BPF prog-id=39 op=UNLOAD Oct 2 18:50:17.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.771424 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 18:50:17.771775 systemd[1]: Stopped kubelet.service. Oct 2 18:50:17.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.791284 systemd[1]: Started kubelet.service. Oct 2 18:50:17.798008 kernel: audit: type=1130 audit(1696272617.770:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.798198 kernel: audit: type=1131 audit(1696272617.770:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.812890 kernel: audit: type=1130 audit(1696272617.791:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:17.954400 kubelet[2328]: E1002 18:50:17.954304 2328 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 18:50:17.958281 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:50:17.958628 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:50:17.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:17.968169 kernel: audit: type=1131 audit(1696272617.958:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:50:21.113227 systemd[1]: Stopped kubelet.service. Oct 2 18:50:21.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:21.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:21.129988 kernel: audit: type=1130 audit(1696272621.114:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:21.130155 kernel: audit: type=1131 audit(1696272621.114:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:21.172854 systemd[1]: Reloading. Oct 2 18:50:21.359719 /usr/lib/systemd/system-generators/torcx-generator[2360]: time="2023-10-02T18:50:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:50:21.366195 /usr/lib/systemd/system-generators/torcx-generator[2360]: time="2023-10-02T18:50:21Z" level=info msg="torcx already run" Oct 2 18:50:21.593754 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:50:21.593796 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:50:21.632860 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:50:21.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.818993 kernel: audit: type=1400 audit(1696272621.803:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819178 kernel: audit: type=1400 audit(1696272621.811:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.826985 kernel: audit: type=1400 audit(1696272621.811:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.834826 kernel: audit: type=1400 audit(1696272621.811:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.850405 kernel: audit: type=1400 audit(1696272621.811:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.850535 kernel: audit: type=1400 audit(1696272621.811:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.860261 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 18:50:21.860414 kernel: audit: type=1400 audit(1696272621.811:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.818000 audit: BPF prog-id=55 op=LOAD Oct 2 18:50:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.819000 audit: BPF prog-id=56 op=LOAD Oct 2 18:50:21.819000 audit: BPF prog-id=37 op=UNLOAD Oct 2 18:50:21.819000 audit: BPF prog-id=38 op=UNLOAD Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.826000 audit: BPF prog-id=57 op=LOAD Oct 2 18:50:21.826000 audit: BPF prog-id=42 op=UNLOAD Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.833000 audit: BPF prog-id=58 op=LOAD Oct 2 18:50:21.833000 audit: BPF prog-id=43 op=UNLOAD Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.841000 audit: BPF prog-id=59 op=LOAD Oct 2 18:50:21.841000 audit: BPF prog-id=44 op=UNLOAD Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.849000 audit: BPF prog-id=60 op=LOAD Oct 2 18:50:21.849000 audit: BPF prog-id=45 op=UNLOAD Oct 2 18:50:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.865000 audit: BPF prog-id=63 op=LOAD Oct 2 18:50:21.865000 audit: BPF prog-id=48 op=UNLOAD Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit: BPF prog-id=64 op=LOAD Oct 2 18:50:21.867000 audit: BPF prog-id=49 op=UNLOAD Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit: BPF prog-id=65 op=LOAD Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.867000 audit: BPF prog-id=66 op=LOAD Oct 2 18:50:21.867000 audit: BPF prog-id=50 op=UNLOAD Oct 2 18:50:21.867000 audit: BPF prog-id=51 op=UNLOAD Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit: BPF prog-id=67 op=LOAD Oct 2 18:50:21.869000 audit: BPF prog-id=52 op=UNLOAD Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit: BPF prog-id=68 op=LOAD Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:21.870000 audit: BPF prog-id=69 op=LOAD Oct 2 18:50:21.870000 audit: BPF prog-id=53 op=UNLOAD Oct 2 18:50:21.870000 audit: BPF prog-id=54 op=UNLOAD Oct 2 18:50:21.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:21.925244 systemd[1]: Started kubelet.service. Oct 2 18:50:22.058970 kubelet[2413]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:22.059575 kubelet[2413]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 18:50:22.059685 kubelet[2413]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:22.060062 kubelet[2413]: I1002 18:50:22.059998 2413 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:50:23.307705 kubelet[2413]: I1002 18:50:23.307660 2413 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 18:50:23.308522 kubelet[2413]: I1002 18:50:23.308491 2413 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:50:23.309012 kubelet[2413]: I1002 18:50:23.308983 2413 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 18:50:23.323064 kubelet[2413]: E1002 18:50:23.322952 2413 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.44:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.323259 kubelet[2413]: I1002 18:50:23.323198 2413 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:50:23.334680 kubelet[2413]: W1002 18:50:23.334621 2413 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:50:23.336041 kubelet[2413]: I1002 18:50:23.335949 2413 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:50:23.336880 kubelet[2413]: I1002 18:50:23.336828 2413 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:50:23.337174 kubelet[2413]: I1002 18:50:23.337140 2413 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 18:50:23.337366 kubelet[2413]: I1002 18:50:23.337244 2413 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 18:50:23.337366 kubelet[2413]: I1002 18:50:23.337268 2413 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 18:50:23.337558 kubelet[2413]: I1002 18:50:23.337518 2413 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:23.338930 kubelet[2413]: I1002 18:50:23.338877 2413 kubelet.go:393] "Attempting to sync node with API server" Oct 2 18:50:23.338930 kubelet[2413]: I1002 18:50:23.338934 2413 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:50:23.339204 kubelet[2413]: I1002 18:50:23.338970 2413 kubelet.go:309] "Adding apiserver pod source" Oct 2 18:50:23.339204 kubelet[2413]: I1002 18:50:23.339058 2413 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:50:23.339544 kubelet[2413]: W1002 18:50:23.339469 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-44&limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.339720 kubelet[2413]: E1002 18:50:23.339694 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-44&limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.341139 kubelet[2413]: W1002 18:50:23.340610 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.341139 kubelet[2413]: E1002 18:50:23.340758 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.341488 kubelet[2413]: I1002 18:50:23.341435 2413 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:50:23.342353 kubelet[2413]: W1002 18:50:23.342300 2413 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 18:50:23.343837 kubelet[2413]: I1002 18:50:23.343773 2413 server.go:1232] "Started kubelet" Oct 2 18:50:23.346000 audit[2413]: AVC avc: denied { mac_admin } for pid=2413 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:23.346000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:23.346000 audit[2413]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007fc2d0 a1=4000e6b0e0 a2=40007fc2a0 a3=25 items=0 ppid=1 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.346000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:23.346000 audit[2413]: AVC avc: denied { mac_admin } for pid=2413 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:23.346000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:23.346000 audit[2413]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000437c20 a1=4000e6b0f8 a2=40007fc360 a3=25 items=0 ppid=1 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.346000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:23.348351 kubelet[2413]: I1002 18:50:23.347477 2413 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:50:23.348351 kubelet[2413]: I1002 18:50:23.347562 2413 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:50:23.348351 kubelet[2413]: I1002 18:50:23.347703 2413 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:50:23.351894 kubelet[2413]: E1002 18:50:23.351685 2413 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-44.178a5ef6b49f87fd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-44", UID:"ip-172-31-21-44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-44"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 50, 23, 343732733, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 50, 23, 343732733, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-21-44"}': 'Post "https://172.31.21.44:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.44:6443: connect: connection refused'(may retry after sleeping) Oct 2 18:50:23.352889 kubelet[2413]: E1002 18:50:23.352840 2413 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:50:23.353048 kubelet[2413]: E1002 18:50:23.352895 2413 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:50:23.357233 kubelet[2413]: I1002 18:50:23.357178 2413 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:50:23.358515 kubelet[2413]: I1002 18:50:23.358453 2413 server.go:462] "Adding debug handlers to kubelet server" Oct 2 18:50:23.359000 audit[2424]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.360563 kubelet[2413]: I1002 18:50:23.360424 2413 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 18:50:23.359000 audit[2424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8e724e0 a2=0 a3=1 items=0 ppid=2413 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.360881 kubelet[2413]: I1002 18:50:23.360773 2413 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 18:50:23.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:50:23.363494 kubelet[2413]: I1002 18:50:23.363437 2413 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 18:50:23.363680 kubelet[2413]: I1002 18:50:23.363638 2413 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 18:50:23.366181 kubelet[2413]: E1002 18:50:23.365832 2413 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-44?timeout=10s\": dial tcp 172.31.21.44:6443: connect: connection refused" interval="200ms" Oct 2 18:50:23.367918 kubelet[2413]: I1002 18:50:23.367468 2413 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 18:50:23.368158 kubelet[2413]: W1002 18:50:23.368102 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.368253 kubelet[2413]: E1002 18:50:23.368179 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.368000 audit[2425]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.368000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe47fef40 a2=0 a3=1 items=0 ppid=2413 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:50:23.385000 audit[2429]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.385000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd3edb50 a2=0 a3=1 items=0 ppid=2413 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:23.399000 audit[2431]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.399000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2d9ad80 a2=0 a3=1 items=0 ppid=2413 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:23.423000 audit[2435]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.423000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd60ad440 a2=0 a3=1 items=0 ppid=2413 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 18:50:23.425289 kubelet[2413]: I1002 18:50:23.425209 2413 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 18:50:23.428000 audit[2436]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:23.428000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb045010 a2=0 a3=1 items=0 ppid=2413 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:50:23.429995 kubelet[2413]: I1002 18:50:23.429935 2413 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 18:50:23.430139 kubelet[2413]: I1002 18:50:23.430041 2413 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 18:50:23.430232 kubelet[2413]: I1002 18:50:23.430143 2413 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 18:50:23.430300 kubelet[2413]: E1002 18:50:23.430244 2413 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 18:50:23.432177 kubelet[2413]: I1002 18:50:23.432133 2413 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 18:50:23.432394 kubelet[2413]: I1002 18:50:23.432366 2413 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 18:50:23.432557 kubelet[2413]: I1002 18:50:23.432535 2413 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:23.432000 audit[2437]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.432000 audit[2437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdaa4b1c0 a2=0 a3=1 items=0 ppid=2413 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:50:23.435043 kubelet[2413]: I1002 18:50:23.435005 2413 policy_none.go:49] "None policy: Start" Oct 2 18:50:23.436585 kubelet[2413]: I1002 18:50:23.436551 2413 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 18:50:23.436783 kubelet[2413]: I1002 18:50:23.436761 2413 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:50:23.436000 audit[2438]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.436000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea783c30 a2=0 a3=1 items=0 ppid=2413 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:50:23.443721 kubelet[2413]: W1002 18:50:23.443642 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.443978 kubelet[2413]: E1002 18:50:23.443953 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:23.445000 audit[2440]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:23.445000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1e1a960 a2=0 a3=1 items=0 ppid=2413 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:50:23.447000 audit[2439]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:23.447000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1e7b560 a2=0 a3=1 items=0 ppid=2413 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:50:23.454001 systemd[1]: Created slice kubepods.slice. Oct 2 18:50:23.467544 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 18:50:23.469969 kubelet[2413]: I1002 18:50:23.469910 2413 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:23.471247 kubelet[2413]: E1002 18:50:23.471125 2413 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.44:6443/api/v1/nodes\": dial tcp 172.31.21.44:6443: connect: connection refused" node="ip-172-31-21-44" Oct 2 18:50:23.472000 audit[2441]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:23.472000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffea88af00 a2=0 a3=1 items=0 ppid=2413 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:50:23.476000 audit[2442]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:23.476000 audit[2442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3fd3140 a2=0 a3=1 items=0 ppid=2413 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:50:23.484121 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 18:50:23.488676 kubelet[2413]: I1002 18:50:23.488635 2413 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:50:23.487000 audit[2413]: AVC avc: denied { mac_admin } for pid=2413 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:23.487000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:23.487000 audit[2413]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007fd320 a1=4000b3bb48 a2=40007fd2f0 a3=25 items=0 ppid=1 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:23.487000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:23.489265 kubelet[2413]: I1002 18:50:23.488751 2413 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:50:23.489265 kubelet[2413]: I1002 18:50:23.489116 2413 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:50:23.492163 kubelet[2413]: E1002 18:50:23.492017 2413 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-44\" not found" Oct 2 18:50:23.530521 kubelet[2413]: I1002 18:50:23.530462 2413 topology_manager.go:215] "Topology Admit Handler" podUID="888997bd47bb9fb1c834eabb68b364a8" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-44" Oct 2 18:50:23.532904 kubelet[2413]: I1002 18:50:23.532839 2413 topology_manager.go:215] "Topology Admit Handler" podUID="3a00f1f9f9dc5f25aa7ca05eef75ac04" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.537022 kubelet[2413]: I1002 18:50:23.536969 2413 topology_manager.go:215] "Topology Admit Handler" podUID="20098933f7f00e47d3925755e48fb07d" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-44" Oct 2 18:50:23.546009 systemd[1]: Created slice kubepods-burstable-pod888997bd47bb9fb1c834eabb68b364a8.slice. Oct 2 18:50:23.568030 kubelet[2413]: E1002 18:50:23.567750 2413 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-44?timeout=10s\": dial tcp 172.31.21.44:6443: connect: connection refused" interval="400ms" Oct 2 18:50:23.573870 systemd[1]: Created slice kubepods-burstable-pod3a00f1f9f9dc5f25aa7ca05eef75ac04.slice. Oct 2 18:50:23.584418 systemd[1]: Created slice kubepods-burstable-pod20098933f7f00e47d3925755e48fb07d.slice. Oct 2 18:50:23.669256 kubelet[2413]: I1002 18:50:23.669168 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.669421 kubelet[2413]: I1002 18:50:23.669394 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.669531 kubelet[2413]: I1002 18:50:23.669500 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.669712 kubelet[2413]: I1002 18:50:23.669623 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-ca-certs\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:23.669808 kubelet[2413]: I1002 18:50:23.669770 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:23.669896 kubelet[2413]: I1002 18:50:23.669885 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:23.670106 kubelet[2413]: I1002 18:50:23.669994 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.670202 kubelet[2413]: I1002 18:50:23.670148 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:23.670291 kubelet[2413]: I1002 18:50:23.670244 2413 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/20098933f7f00e47d3925755e48fb07d-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-44\" (UID: \"20098933f7f00e47d3925755e48fb07d\") " pod="kube-system/kube-scheduler-ip-172-31-21-44" Oct 2 18:50:23.673606 kubelet[2413]: I1002 18:50:23.673568 2413 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:23.674408 kubelet[2413]: E1002 18:50:23.674369 2413 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.44:6443/api/v1/nodes\": dial tcp 172.31.21.44:6443: connect: connection refused" node="ip-172-31-21-44" Oct 2 18:50:23.868651 env[1739]: time="2023-10-02T18:50:23.868485389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-44,Uid:888997bd47bb9fb1c834eabb68b364a8,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:23.881714 env[1739]: time="2023-10-02T18:50:23.881637728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-44,Uid:3a00f1f9f9dc5f25aa7ca05eef75ac04,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:23.890279 env[1739]: time="2023-10-02T18:50:23.889770334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-44,Uid:20098933f7f00e47d3925755e48fb07d,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:23.970446 kubelet[2413]: E1002 18:50:23.970385 2413 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-44?timeout=10s\": dial tcp 172.31.21.44:6443: connect: connection refused" interval="800ms" Oct 2 18:50:24.077799 kubelet[2413]: I1002 18:50:24.077738 2413 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:24.078397 kubelet[2413]: E1002 18:50:24.078357 2413 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.44:6443/api/v1/nodes\": dial tcp 172.31.21.44:6443: connect: connection refused" node="ip-172-31-21-44" Oct 2 18:50:24.308379 kubelet[2413]: W1002 18:50:24.308211 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-44&limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.308379 kubelet[2413]: E1002 18:50:24.308342 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-44&limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.385980 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3301946428.mount: Deactivated successfully. Oct 2 18:50:24.394201 env[1739]: time="2023-10-02T18:50:24.394122064Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.400916 env[1739]: time="2023-10-02T18:50:24.400847485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.403686 env[1739]: time="2023-10-02T18:50:24.403618904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.408229 env[1739]: time="2023-10-02T18:50:24.408157385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.415141 env[1739]: time="2023-10-02T18:50:24.415046036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.417046 env[1739]: time="2023-10-02T18:50:24.416975726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.425252 env[1739]: time="2023-10-02T18:50:24.425191565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.440847 env[1739]: time="2023-10-02T18:50:24.440793098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.447580 env[1739]: time="2023-10-02T18:50:24.447517846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.452516 env[1739]: time="2023-10-02T18:50:24.452404570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.459340 env[1739]: time="2023-10-02T18:50:24.459249076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.460916 env[1739]: time="2023-10-02T18:50:24.460826354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:24.463601 kubelet[2413]: W1002 18:50:24.463480 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.463601 kubelet[2413]: E1002 18:50:24.463567 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.506347 kubelet[2413]: W1002 18:50:24.506180 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.506347 kubelet[2413]: E1002 18:50:24.506302 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.527332 env[1739]: time="2023-10-02T18:50:24.527132740Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:24.527332 env[1739]: time="2023-10-02T18:50:24.527292509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:24.527575 env[1739]: time="2023-10-02T18:50:24.527357224Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:24.528150 env[1739]: time="2023-10-02T18:50:24.528002489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68fd5f128370f0e4eba1dde8225332cee02f9572e048136a2aeaa21ca885482e pid=2454 runtime=io.containerd.runc.v2 Oct 2 18:50:24.529515 env[1739]: time="2023-10-02T18:50:24.529354850Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:24.529816 env[1739]: time="2023-10-02T18:50:24.529718533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:24.530086 env[1739]: time="2023-10-02T18:50:24.529974353Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:24.531338 env[1739]: time="2023-10-02T18:50:24.531164746Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f7d58df442b2f26c3935bc9027387fdfbfb77fbb51c6950f68cb2a541131ef5 pid=2467 runtime=io.containerd.runc.v2 Oct 2 18:50:24.566834 env[1739]: time="2023-10-02T18:50:24.566288061Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:24.566834 env[1739]: time="2023-10-02T18:50:24.566367387Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:24.566834 env[1739]: time="2023-10-02T18:50:24.566393365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:24.570221 env[1739]: time="2023-10-02T18:50:24.568875705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd55ecd19aaab0d85156a7e4f5747841192da96c0a60162a926dfd0c8d33a23f pid=2490 runtime=io.containerd.runc.v2 Oct 2 18:50:24.579297 systemd[1]: Started cri-containerd-4f7d58df442b2f26c3935bc9027387fdfbfb77fbb51c6950f68cb2a541131ef5.scope. Oct 2 18:50:24.601557 systemd[1]: Started cri-containerd-68fd5f128370f0e4eba1dde8225332cee02f9572e048136a2aeaa21ca885482e.scope. Oct 2 18:50:24.639471 systemd[1]: Started cri-containerd-dd55ecd19aaab0d85156a7e4f5747841192da96c0a60162a926dfd0c8d33a23f.scope. Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.682000 audit: BPF prog-id=70 op=LOAD Oct 2 18:50:24.684000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.684000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2454 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666435663132383337306630653465626131646465383232353333 Oct 2 18:50:24.684000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.684000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2454 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666435663132383337306630653465626131646465383232353333 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.685000 audit: BPF prog-id=71 op=LOAD Oct 2 18:50:24.685000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2454 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666435663132383337306630653465626131646465383232353333 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.687000 audit: BPF prog-id=72 op=LOAD Oct 2 18:50:24.687000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2454 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666435663132383337306630653465626131646465383232353333 Oct 2 18:50:24.688000 audit: BPF prog-id=72 op=UNLOAD Oct 2 18:50:24.688000 audit: BPF prog-id=71 op=UNLOAD Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.690000 audit: BPF prog-id=73 op=LOAD Oct 2 18:50:24.690000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2454 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666435663132383337306630653465626131646465383232353333 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.692000 audit: BPF prog-id=74 op=LOAD Oct 2 18:50:24.695000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.695000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2467 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376435386466343432623266323663333933356263393032373338 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2467 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376435386466343432623266323663333933356263393032373338 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.696000 audit: BPF prog-id=75 op=LOAD Oct 2 18:50:24.696000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2467 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376435386466343432623266323663333933356263393032373338 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.698000 audit: BPF prog-id=76 op=LOAD Oct 2 18:50:24.698000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2467 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376435386466343432623266323663333933356263393032373338 Oct 2 18:50:24.700000 audit: BPF prog-id=76 op=UNLOAD Oct 2 18:50:24.701000 audit: BPF prog-id=75 op=UNLOAD Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.701000 audit: BPF prog-id=77 op=LOAD Oct 2 18:50:24.701000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2467 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376435386466343432623266323663333933356263393032373338 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.708000 audit: BPF prog-id=78 op=LOAD Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2490 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353565636431396161616230643835313536613765346635373437 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2490 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353565636431396161616230643835313536613765346635373437 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.710000 audit: BPF prog-id=79 op=LOAD Oct 2 18:50:24.710000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2490 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353565636431396161616230643835313536613765346635373437 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit: BPF prog-id=80 op=LOAD Oct 2 18:50:24.711000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2490 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353565636431396161616230643835313536613765346635373437 Oct 2 18:50:24.711000 audit: BPF prog-id=80 op=UNLOAD Oct 2 18:50:24.711000 audit: BPF prog-id=79 op=UNLOAD Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:24.711000 audit: BPF prog-id=81 op=LOAD Oct 2 18:50:24.711000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2490 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:24.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464353565636431396161616230643835313536613765346635373437 Oct 2 18:50:24.771892 kubelet[2413]: E1002 18:50:24.771773 2413 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-44?timeout=10s\": dial tcp 172.31.21.44:6443: connect: connection refused" interval="1.6s" Oct 2 18:50:24.792234 env[1739]: time="2023-10-02T18:50:24.792169162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-44,Uid:888997bd47bb9fb1c834eabb68b364a8,Namespace:kube-system,Attempt:0,} returns sandbox id \"68fd5f128370f0e4eba1dde8225332cee02f9572e048136a2aeaa21ca885482e\"" Oct 2 18:50:24.802978 env[1739]: time="2023-10-02T18:50:24.802915896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-44,Uid:3a00f1f9f9dc5f25aa7ca05eef75ac04,Namespace:kube-system,Attempt:0,} returns sandbox id \"4f7d58df442b2f26c3935bc9027387fdfbfb77fbb51c6950f68cb2a541131ef5\"" Oct 2 18:50:24.810932 env[1739]: time="2023-10-02T18:50:24.810842824Z" level=info msg="CreateContainer within sandbox \"4f7d58df442b2f26c3935bc9027387fdfbfb77fbb51c6950f68cb2a541131ef5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 18:50:24.827123 env[1739]: time="2023-10-02T18:50:24.818787968Z" level=info msg="CreateContainer within sandbox \"68fd5f128370f0e4eba1dde8225332cee02f9572e048136a2aeaa21ca885482e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 18:50:24.854765 env[1739]: time="2023-10-02T18:50:24.854687144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-44,Uid:20098933f7f00e47d3925755e48fb07d,Namespace:kube-system,Attempt:0,} returns sandbox id \"dd55ecd19aaab0d85156a7e4f5747841192da96c0a60162a926dfd0c8d33a23f\"" Oct 2 18:50:24.863035 env[1739]: time="2023-10-02T18:50:24.862558344Z" level=info msg="CreateContainer within sandbox \"4f7d58df442b2f26c3935bc9027387fdfbfb77fbb51c6950f68cb2a541131ef5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e6f1611caf19e9bc77981856b2b9920534465ae7beeef74ae8a1b7f28583db1c\"" Oct 2 18:50:24.863796 env[1739]: time="2023-10-02T18:50:24.863725944Z" level=info msg="StartContainer for \"e6f1611caf19e9bc77981856b2b9920534465ae7beeef74ae8a1b7f28583db1c\"" Oct 2 18:50:24.865123 env[1739]: time="2023-10-02T18:50:24.865020210Z" level=info msg="CreateContainer within sandbox \"dd55ecd19aaab0d85156a7e4f5747841192da96c0a60162a926dfd0c8d33a23f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 18:50:24.872097 env[1739]: time="2023-10-02T18:50:24.871966138Z" level=info msg="CreateContainer within sandbox \"68fd5f128370f0e4eba1dde8225332cee02f9572e048136a2aeaa21ca885482e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"be9066e83801f2b18780ccd00432aaa36ad39851eb59e24b63f568982f252b25\"" Oct 2 18:50:24.873614 env[1739]: time="2023-10-02T18:50:24.873550421Z" level=info msg="StartContainer for \"be9066e83801f2b18780ccd00432aaa36ad39851eb59e24b63f568982f252b25\"" Oct 2 18:50:24.882591 kubelet[2413]: W1002 18:50:24.882428 2413 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.882591 kubelet[2413]: E1002 18:50:24.882523 2413 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.44:6443: connect: connection refused Oct 2 18:50:24.886487 kubelet[2413]: I1002 18:50:24.885419 2413 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:24.886487 kubelet[2413]: E1002 18:50:24.886411 2413 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.44:6443/api/v1/nodes\": dial tcp 172.31.21.44:6443: connect: connection refused" node="ip-172-31-21-44" Oct 2 18:50:24.900350 env[1739]: time="2023-10-02T18:50:24.900215281Z" level=info msg="CreateContainer within sandbox \"dd55ecd19aaab0d85156a7e4f5747841192da96c0a60162a926dfd0c8d33a23f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"669823b59f07f1d05fa673b4eee3456dc6ad67f728ceae8d043eef7ca4029305\"" Oct 2 18:50:24.901718 env[1739]: time="2023-10-02T18:50:24.901655739Z" level=info msg="StartContainer for \"669823b59f07f1d05fa673b4eee3456dc6ad67f728ceae8d043eef7ca4029305\"" Oct 2 18:50:24.944397 systemd[1]: Started cri-containerd-e6f1611caf19e9bc77981856b2b9920534465ae7beeef74ae8a1b7f28583db1c.scope. Oct 2 18:50:24.954574 systemd[1]: Started cri-containerd-be9066e83801f2b18780ccd00432aaa36ad39851eb59e24b63f568982f252b25.scope. Oct 2 18:50:25.023932 systemd[1]: Started cri-containerd-669823b59f07f1d05fa673b4eee3456dc6ad67f728ceae8d043eef7ca4029305.scope. Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.046000 audit: BPF prog-id=82 op=LOAD Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2454 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393036366538333830316632623138373830636364303034333261 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2454 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393036366538333830316632623138373830636364303034333261 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit: BPF prog-id=83 op=LOAD Oct 2 18:50:25.047000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2454 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393036366538333830316632623138373830636364303034333261 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.047000 audit: BPF prog-id=84 op=LOAD Oct 2 18:50:25.047000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2454 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393036366538333830316632623138373830636364303034333261 Oct 2 18:50:25.047000 audit: BPF prog-id=84 op=UNLOAD Oct 2 18:50:25.048000 audit: BPF prog-id=83 op=UNLOAD Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.048000 audit: BPF prog-id=85 op=LOAD Oct 2 18:50:25.048000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2454 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393036366538333830316632623138373830636364303034333261 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.055000 audit: BPF prog-id=86 op=LOAD Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2467 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663136313163616631396539626337373938313835366232623939 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2467 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663136313163616631396539626337373938313835366232623939 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit: BPF prog-id=87 op=LOAD Oct 2 18:50:25.056000 audit[2590]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2467 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663136313163616631396539626337373938313835366232623939 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.056000 audit: BPF prog-id=88 op=LOAD Oct 2 18:50:25.056000 audit[2590]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2467 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663136313163616631396539626337373938313835366232623939 Oct 2 18:50:25.057000 audit: BPF prog-id=88 op=UNLOAD Oct 2 18:50:25.057000 audit: BPF prog-id=87 op=UNLOAD Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.057000 audit: BPF prog-id=89 op=LOAD Oct 2 18:50:25.057000 audit[2590]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2467 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663136313163616631396539626337373938313835366232623939 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.122000 audit: BPF prog-id=90 op=LOAD Oct 2 18:50:25.131000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.131000 audit[2625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2490 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393832336235396630376631643035666136373362346565653334 Oct 2 18:50:25.131000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.131000 audit[2625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2490 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393832336235396630376631643035666136373362346565653334 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.135000 audit: BPF prog-id=91 op=LOAD Oct 2 18:50:25.135000 audit[2625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2490 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393832336235396630376631643035666136373362346565653334 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.137000 audit: BPF prog-id=92 op=LOAD Oct 2 18:50:25.137000 audit[2625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2490 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393832336235396630376631643035666136373362346565653334 Oct 2 18:50:25.138000 audit: BPF prog-id=92 op=UNLOAD Oct 2 18:50:25.138000 audit: BPF prog-id=91 op=UNLOAD Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:25.139000 audit: BPF prog-id=93 op=LOAD Oct 2 18:50:25.139000 audit[2625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2490 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393832336235396630376631643035666136373362346565653334 Oct 2 18:50:25.161443 env[1739]: time="2023-10-02T18:50:25.161371600Z" level=info msg="StartContainer for \"be9066e83801f2b18780ccd00432aaa36ad39851eb59e24b63f568982f252b25\" returns successfully" Oct 2 18:50:25.169601 env[1739]: time="2023-10-02T18:50:25.169535868Z" level=info msg="StartContainer for \"e6f1611caf19e9bc77981856b2b9920534465ae7beeef74ae8a1b7f28583db1c\" returns successfully" Oct 2 18:50:25.225364 env[1739]: time="2023-10-02T18:50:25.225283578Z" level=info msg="StartContainer for \"669823b59f07f1d05fa673b4eee3456dc6ad67f728ceae8d043eef7ca4029305\" returns successfully" Oct 2 18:50:26.489036 kubelet[2413]: I1002 18:50:26.488986 2413 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:27.422211 update_engine[1736]: I1002 18:50:27.422142 1736 update_attempter.cc:505] Updating boot flags... Oct 2 18:50:28.967000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:28.970573 kernel: kauditd_printk_skb: 595 callbacks suppressed Oct 2 18:50:28.970762 kernel: audit: type=1400 audit(1696272628.967:702): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:28.967000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4001099d40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:28.996462 kernel: audit: type=1300 audit(1696272628.967:702): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4001099d40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:28.967000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.010596 kernel: audit: type=1327 audit(1696272628.967:702): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:28.979000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.023890 kernel: audit: type=1400 audit(1696272628.979:703): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:28.979000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4000e4a030 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:29.040480 kernel: audit: type=1300 audit(1696272628.979:703): arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4000e4a030 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:28.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.054495 kernel: audit: type=1327 audit(1696272628.979:703): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:28.980000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.065664 kernel: audit: type=1400 audit(1696272628.980:704): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:28.980000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40082fef40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:29.081425 kernel: audit: type=1300 audit(1696272628.980:704): arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40082fef40 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:28.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.095722 kernel: audit: type=1327 audit(1696272628.980:704): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.094000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.107150 kernel: audit: type=1400 audit(1696272629.094:705): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.094000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=53 a1=4000a46900 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:29.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.110000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.110000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=54 a1=4006261dc0 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:29.110000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.111000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.111000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=54 a1=40031033b0 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:50:29.111000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:50:29.241869 kubelet[2413]: E1002 18:50:29.241599 2413 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-21-44\" not found" node="ip-172-31-21-44" Oct 2 18:50:29.289693 kubelet[2413]: I1002 18:50:29.289647 2413 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-44" Oct 2 18:50:29.342000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.342000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400095c000 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:29.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:29.343663 kubelet[2413]: I1002 18:50:29.343363 2413 apiserver.go:52] "Watching apiserver" Oct 2 18:50:29.343000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:29.343000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400043c1c0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:29.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:29.371234 kubelet[2413]: I1002 18:50:29.371167 2413 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 18:50:32.108737 systemd[1]: Reloading. Oct 2 18:50:32.299641 /usr/lib/systemd/system-generators/torcx-generator[2811]: time="2023-10-02T18:50:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:50:32.304941 /usr/lib/systemd/system-generators/torcx-generator[2811]: time="2023-10-02T18:50:32Z" level=info msg="torcx already run" Oct 2 18:50:32.560386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:50:32.560642 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:50:32.600282 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:50:32.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.817000 audit: BPF prog-id=94 op=LOAD Oct 2 18:50:32.817000 audit: BPF prog-id=70 op=UNLOAD Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit: BPF prog-id=95 op=LOAD Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.824000 audit: BPF prog-id=96 op=LOAD Oct 2 18:50:32.824000 audit: BPF prog-id=55 op=UNLOAD Oct 2 18:50:32.824000 audit: BPF prog-id=56 op=UNLOAD Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.826000 audit: BPF prog-id=97 op=LOAD Oct 2 18:50:32.826000 audit: BPF prog-id=78 op=UNLOAD Oct 2 18:50:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.829000 audit: BPF prog-id=98 op=LOAD Oct 2 18:50:32.829000 audit: BPF prog-id=90 op=UNLOAD Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.832000 audit: BPF prog-id=99 op=LOAD Oct 2 18:50:32.833000 audit: BPF prog-id=57 op=UNLOAD Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.838000 audit: BPF prog-id=100 op=LOAD Oct 2 18:50:32.838000 audit: BPF prog-id=58 op=UNLOAD Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.845000 audit: BPF prog-id=101 op=LOAD Oct 2 18:50:32.845000 audit: BPF prog-id=59 op=UNLOAD Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.848000 audit: BPF prog-id=102 op=LOAD Oct 2 18:50:32.848000 audit: BPF prog-id=86 op=UNLOAD Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.853000 audit: BPF prog-id=103 op=LOAD Oct 2 18:50:32.853000 audit: BPF prog-id=60 op=UNLOAD Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit: BPF prog-id=104 op=LOAD Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.856000 audit: BPF prog-id=105 op=LOAD Oct 2 18:50:32.856000 audit: BPF prog-id=61 op=UNLOAD Oct 2 18:50:32.856000 audit: BPF prog-id=62 op=UNLOAD Oct 2 18:50:32.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.863000 audit: BPF prog-id=106 op=LOAD Oct 2 18:50:32.863000 audit: BPF prog-id=82 op=UNLOAD Oct 2 18:50:32.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.866000 audit: BPF prog-id=107 op=LOAD Oct 2 18:50:32.866000 audit: BPF prog-id=74 op=UNLOAD Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.868000 audit: BPF prog-id=108 op=LOAD Oct 2 18:50:32.868000 audit: BPF prog-id=63 op=UNLOAD Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.871000 audit: BPF prog-id=109 op=LOAD Oct 2 18:50:32.871000 audit: BPF prog-id=64 op=UNLOAD Oct 2 18:50:32.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit: BPF prog-id=110 op=LOAD Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.873000 audit: BPF prog-id=111 op=LOAD Oct 2 18:50:32.873000 audit: BPF prog-id=65 op=UNLOAD Oct 2 18:50:32.873000 audit: BPF prog-id=66 op=UNLOAD Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit: BPF prog-id=112 op=LOAD Oct 2 18:50:32.877000 audit: BPF prog-id=67 op=UNLOAD Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit: BPF prog-id=113 op=LOAD Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:32.879000 audit: BPF prog-id=114 op=LOAD Oct 2 18:50:32.879000 audit: BPF prog-id=68 op=UNLOAD Oct 2 18:50:32.879000 audit: BPF prog-id=69 op=UNLOAD Oct 2 18:50:32.917505 systemd[1]: Stopping kubelet.service... Oct 2 18:50:32.937746 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 18:50:32.938189 systemd[1]: Stopped kubelet.service. Oct 2 18:50:32.938282 systemd[1]: kubelet.service: Consumed 2.052s CPU time. Oct 2 18:50:32.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:32.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:32.942737 systemd[1]: Started kubelet.service. Oct 2 18:50:33.204806 kubelet[2866]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:33.204806 kubelet[2866]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 18:50:33.204806 kubelet[2866]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:50:33.208100 kubelet[2866]: I1002 18:50:33.205038 2866 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:50:33.230766 kubelet[2866]: I1002 18:50:33.230701 2866 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 18:50:33.230766 kubelet[2866]: I1002 18:50:33.230753 2866 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:50:33.231137 kubelet[2866]: I1002 18:50:33.231103 2866 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 18:50:33.247781 kubelet[2866]: I1002 18:50:33.247740 2866 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 18:50:33.252892 kubelet[2866]: I1002 18:50:33.251929 2866 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:50:33.275846 kubelet[2866]: W1002 18:50:33.275740 2866 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:50:33.281204 kubelet[2866]: I1002 18:50:33.281166 2866 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:50:33.284719 kubelet[2866]: I1002 18:50:33.281904 2866 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:50:33.285268 kubelet[2866]: I1002 18:50:33.285226 2866 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 18:50:33.285558 kubelet[2866]: I1002 18:50:33.285536 2866 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 18:50:33.285685 kubelet[2866]: I1002 18:50:33.285663 2866 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 18:50:33.285837 kubelet[2866]: I1002 18:50:33.285816 2866 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:33.286512 kubelet[2866]: I1002 18:50:33.286490 2866 kubelet.go:393] "Attempting to sync node with API server" Oct 2 18:50:33.295162 kubelet[2866]: I1002 18:50:33.286631 2866 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:50:33.296898 kubelet[2866]: I1002 18:50:33.296847 2866 kubelet.go:309] "Adding apiserver pod source" Oct 2 18:50:33.297110 kubelet[2866]: I1002 18:50:33.296966 2866 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:50:33.312452 kubelet[2866]: I1002 18:50:33.312402 2866 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:50:33.313735 kubelet[2866]: I1002 18:50:33.313690 2866 server.go:1232] "Started kubelet" Oct 2 18:50:33.323000 audit[2866]: AVC avc: denied { mac_admin } for pid=2866 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:33.323000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:33.323000 audit[2866]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000be62d0 a1=4000994cd8 a2=4000be62a0 a3=25 items=0 ppid=1 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:33.323000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:33.323000 audit[2866]: AVC avc: denied { mac_admin } for pid=2866 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:33.323000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:33.323000 audit[2866]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b8b120 a1=4000994cf0 a2=4000be6360 a3=25 items=0 ppid=1 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:33.323000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:33.327664 kubelet[2866]: I1002 18:50:33.324978 2866 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:50:33.327664 kubelet[2866]: I1002 18:50:33.325054 2866 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:50:33.327664 kubelet[2866]: I1002 18:50:33.325134 2866 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:50:33.335583 kubelet[2866]: E1002 18:50:33.335544 2866 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:50:33.335797 kubelet[2866]: E1002 18:50:33.335773 2866 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:50:33.347411 kubelet[2866]: I1002 18:50:33.347352 2866 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:50:33.348708 kubelet[2866]: I1002 18:50:33.348658 2866 server.go:462] "Adding debug handlers to kubelet server" Oct 2 18:50:33.352952 kubelet[2866]: I1002 18:50:33.352919 2866 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 18:50:33.353465 kubelet[2866]: I1002 18:50:33.353442 2866 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 18:50:33.354763 kubelet[2866]: I1002 18:50:33.354714 2866 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 18:50:33.355521 kubelet[2866]: I1002 18:50:33.355474 2866 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 18:50:33.355816 kubelet[2866]: I1002 18:50:33.355760 2866 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 18:50:33.464116 kubelet[2866]: I1002 18:50:33.461212 2866 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-44" Oct 2 18:50:33.468625 kubelet[2866]: I1002 18:50:33.468580 2866 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 18:50:33.487878 kubelet[2866]: I1002 18:50:33.487844 2866 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 18:50:33.488165 kubelet[2866]: I1002 18:50:33.488140 2866 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 18:50:33.488356 kubelet[2866]: I1002 18:50:33.488332 2866 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 18:50:33.488679 kubelet[2866]: E1002 18:50:33.488630 2866 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 18:50:33.503215 kubelet[2866]: I1002 18:50:33.503171 2866 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-21-44" Oct 2 18:50:33.505637 kubelet[2866]: I1002 18:50:33.505605 2866 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-44" Oct 2 18:50:33.589626 kubelet[2866]: E1002 18:50:33.589584 2866 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 18:50:33.592485 kubelet[2866]: I1002 18:50:33.592445 2866 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 18:50:33.592725 kubelet[2866]: I1002 18:50:33.592699 2866 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 18:50:33.592858 kubelet[2866]: I1002 18:50:33.592836 2866 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:50:33.593320 kubelet[2866]: I1002 18:50:33.593293 2866 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 18:50:33.593525 kubelet[2866]: I1002 18:50:33.593486 2866 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 18:50:33.593637 kubelet[2866]: I1002 18:50:33.593616 2866 policy_none.go:49] "None policy: Start" Oct 2 18:50:33.595645 kubelet[2866]: I1002 18:50:33.595610 2866 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 18:50:33.595857 kubelet[2866]: I1002 18:50:33.595835 2866 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:50:33.596336 kubelet[2866]: I1002 18:50:33.596305 2866 state_mem.go:75] "Updated machine memory state" Oct 2 18:50:33.610017 kubelet[2866]: I1002 18:50:33.609964 2866 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:50:33.609000 audit[2866]: AVC avc: denied { mac_admin } for pid=2866 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:33.609000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:50:33.609000 audit[2866]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400114b440 a1=4001159728 a2=400114b410 a3=25 items=0 ppid=1 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:33.609000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:50:33.613280 kubelet[2866]: I1002 18:50:33.613249 2866 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:50:33.616644 kubelet[2866]: I1002 18:50:33.616606 2866 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:50:33.790227 kubelet[2866]: I1002 18:50:33.790180 2866 topology_manager.go:215] "Topology Admit Handler" podUID="888997bd47bb9fb1c834eabb68b364a8" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-44" Oct 2 18:50:33.790607 kubelet[2866]: I1002 18:50:33.790563 2866 topology_manager.go:215] "Topology Admit Handler" podUID="3a00f1f9f9dc5f25aa7ca05eef75ac04" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:33.791963 kubelet[2866]: I1002 18:50:33.791915 2866 topology_manager.go:215] "Topology Admit Handler" podUID="20098933f7f00e47d3925755e48fb07d" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-44" Oct 2 18:50:33.857394 kubelet[2866]: I1002 18:50:33.857349 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:33.857666 kubelet[2866]: I1002 18:50:33.857631 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:33.857817 kubelet[2866]: I1002 18:50:33.857796 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/20098933f7f00e47d3925755e48fb07d-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-44\" (UID: \"20098933f7f00e47d3925755e48fb07d\") " pod="kube-system/kube-scheduler-ip-172-31-21-44" Oct 2 18:50:33.857975 kubelet[2866]: I1002 18:50:33.857955 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-ca-certs\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:33.858235 kubelet[2866]: I1002 18:50:33.858202 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/888997bd47bb9fb1c834eabb68b364a8-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-44\" (UID: \"888997bd47bb9fb1c834eabb68b364a8\") " pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:33.858423 kubelet[2866]: I1002 18:50:33.858402 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:33.858581 kubelet[2866]: I1002 18:50:33.858561 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:33.858739 kubelet[2866]: I1002 18:50:33.858719 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:33.858920 kubelet[2866]: I1002 18:50:33.858879 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a00f1f9f9dc5f25aa7ca05eef75ac04-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-44\" (UID: \"3a00f1f9f9dc5f25aa7ca05eef75ac04\") " pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:34.298436 kubelet[2866]: I1002 18:50:34.298384 2866 apiserver.go:52] "Watching apiserver" Oct 2 18:50:34.355687 kubelet[2866]: I1002 18:50:34.355639 2866 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 18:50:34.582982 kubelet[2866]: E1002 18:50:34.582849 2866 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-21-44\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-21-44" Oct 2 18:50:34.591294 kubelet[2866]: E1002 18:50:34.591242 2866 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-21-44\" already exists" pod="kube-system/kube-apiserver-ip-172-31-21-44" Oct 2 18:50:34.627953 kubelet[2866]: I1002 18:50:34.627897 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-44" podStartSLOduration=1.627773463 podCreationTimestamp="2023-10-02 18:50:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:34.626281306 +0000 UTC m=+1.656961442" watchObservedRunningTime="2023-10-02 18:50:34.627773463 +0000 UTC m=+1.658453587" Oct 2 18:50:34.680350 kubelet[2866]: I1002 18:50:34.680283 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-44" podStartSLOduration=1.680230189 podCreationTimestamp="2023-10-02 18:50:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:34.642555759 +0000 UTC m=+1.673235907" watchObservedRunningTime="2023-10-02 18:50:34.680230189 +0000 UTC m=+1.710910313" Oct 2 18:50:39.175207 sudo[2003]: pam_unix(sudo:session): session closed for user root Oct 2 18:50:39.178285 kernel: kauditd_printk_skb: 272 callbacks suppressed Oct 2 18:50:39.178547 kernel: audit: type=1106 audit(1696272639.174:959): pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.174000 audit[2003]: USER_END pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.174000 audit[2003]: CRED_DISP pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.196379 kernel: audit: type=1104 audit(1696272639.174:960): pid=2003 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.198753 sshd[2000]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:39.199000 audit[2000]: USER_END pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:39.199000 audit[2000]: CRED_DISP pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:39.215439 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 18:50:39.215803 systemd[1]: session-7.scope: Consumed 11.475s CPU time. Oct 2 18:50:39.217289 systemd[1]: sshd@6-172.31.21.44:22-139.178.89.65:51446.service: Deactivated successfully. Oct 2 18:50:39.222513 kernel: audit: type=1106 audit(1696272639.199:961): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:39.222674 kernel: audit: type=1104 audit(1696272639.199:962): pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:39.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.44:22-139.178.89.65:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.233489 kernel: audit: type=1131 audit(1696272639.212:963): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.44:22-139.178.89.65:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:39.234092 systemd-logind[1735]: Session 7 logged out. Waiting for processes to exit. Oct 2 18:50:39.235932 systemd-logind[1735]: Removed session 7. Oct 2 18:50:41.634574 kubelet[2866]: I1002 18:50:41.634512 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-44" podStartSLOduration=8.634420391999999 podCreationTimestamp="2023-10-02 18:50:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:34.680419255 +0000 UTC m=+1.711099355" watchObservedRunningTime="2023-10-02 18:50:41.634420392 +0000 UTC m=+8.665100516" Oct 2 18:50:43.368000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.379118 kernel: audit: type=1400 audit(1696272643.368:964): avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.379252 kernel: audit: type=1300 audit(1696272643.368:964): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f47780 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.368000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f47780 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:43.402687 kernel: audit: type=1327 audit(1696272643.368:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:43.402851 kernel: audit: type=1400 audit(1696272643.373:965): avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.373000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.373000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f479a0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.425486 kernel: audit: type=1300 audit(1696272643.373:965): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f479a0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:43.373000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.373000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f47c20 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:43.378000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.378000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f47dc0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:43.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:44.175000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:50:44.179047 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 18:50:44.179195 kernel: audit: type=1400 audit(1696272644.175:968): avc: denied { watch } for pid=2624 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:50:44.175000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c45280 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:44.202458 kernel: audit: type=1300 audit(1696272644.175:968): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c45280 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:50:44.175000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:44.214476 kernel: audit: type=1327 audit(1696272644.175:968): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:46.597607 kubelet[2866]: I1002 18:50:46.597573 2866 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 18:50:46.599272 env[1739]: time="2023-10-02T18:50:46.599197877Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 18:50:46.600654 kubelet[2866]: I1002 18:50:46.600620 2866 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 18:50:46.754123 kubelet[2866]: I1002 18:50:46.754052 2866 topology_manager.go:215] "Topology Admit Handler" podUID="1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d" podNamespace="kube-system" podName="kube-proxy-8rhz7" Oct 2 18:50:46.765298 systemd[1]: Created slice kubepods-besteffort-pod1c1f6bee_7f49_4cd6_968c_565f2e5ecd2d.slice. Oct 2 18:50:46.841592 kubelet[2866]: I1002 18:50:46.841486 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-kube-proxy\") pod \"kube-proxy-8rhz7\" (UID: \"1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d\") " pod="kube-system/kube-proxy-8rhz7" Oct 2 18:50:46.841925 kubelet[2866]: I1002 18:50:46.841876 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-xtables-lock\") pod \"kube-proxy-8rhz7\" (UID: \"1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d\") " pod="kube-system/kube-proxy-8rhz7" Oct 2 18:50:46.842233 kubelet[2866]: I1002 18:50:46.842210 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvpl7\" (UniqueName: \"kubernetes.io/projected/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-kube-api-access-rvpl7\") pod \"kube-proxy-8rhz7\" (UID: \"1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d\") " pod="kube-system/kube-proxy-8rhz7" Oct 2 18:50:46.842451 kubelet[2866]: I1002 18:50:46.842411 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-lib-modules\") pod \"kube-proxy-8rhz7\" (UID: \"1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d\") " pod="kube-system/kube-proxy-8rhz7" Oct 2 18:50:46.954773 kubelet[2866]: E1002 18:50:46.954617 2866 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Oct 2 18:50:46.954773 kubelet[2866]: E1002 18:50:46.954724 2866 projected.go:198] Error preparing data for projected volume kube-api-access-rvpl7 for pod kube-system/kube-proxy-8rhz7: configmap "kube-root-ca.crt" not found Oct 2 18:50:46.955040 kubelet[2866]: E1002 18:50:46.954843 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-kube-api-access-rvpl7 podName:1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d nodeName:}" failed. No retries permitted until 2023-10-02 18:50:47.454809494 +0000 UTC m=+14.485489594 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rvpl7" (UniqueName: "kubernetes.io/projected/1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d-kube-api-access-rvpl7") pod "kube-proxy-8rhz7" (UID: "1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d") : configmap "kube-root-ca.crt" not found Oct 2 18:50:47.614263 kubelet[2866]: I1002 18:50:47.614216 2866 topology_manager.go:215] "Topology Admit Handler" podUID="b943fa3f-3dab-4ef4-8f69-63a34b45e595" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-zrgwp" Oct 2 18:50:47.625973 systemd[1]: Created slice kubepods-besteffort-podb943fa3f_3dab_4ef4_8f69_63a34b45e595.slice. Oct 2 18:50:47.649347 kubelet[2866]: I1002 18:50:47.649262 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wfnz\" (UniqueName: \"kubernetes.io/projected/b943fa3f-3dab-4ef4-8f69-63a34b45e595-kube-api-access-9wfnz\") pod \"tigera-operator-8547bd6cc6-zrgwp\" (UID: \"b943fa3f-3dab-4ef4-8f69-63a34b45e595\") " pod="tigera-operator/tigera-operator-8547bd6cc6-zrgwp" Oct 2 18:50:47.649524 kubelet[2866]: I1002 18:50:47.649387 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b943fa3f-3dab-4ef4-8f69-63a34b45e595-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-zrgwp\" (UID: \"b943fa3f-3dab-4ef4-8f69-63a34b45e595\") " pod="tigera-operator/tigera-operator-8547bd6cc6-zrgwp" Oct 2 18:50:47.678937 env[1739]: time="2023-10-02T18:50:47.678875994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8rhz7,Uid:1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d,Namespace:kube-system,Attempt:0,}" Oct 2 18:50:47.723059 env[1739]: time="2023-10-02T18:50:47.722900388Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:47.723059 env[1739]: time="2023-10-02T18:50:47.722980515Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:47.723402 env[1739]: time="2023-10-02T18:50:47.723021683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:47.723867 env[1739]: time="2023-10-02T18:50:47.723744492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82d6e454dfc7d8478d881245cbd51f5339b6fb8093ceccfaf986b632fbac85a0 pid=2952 runtime=io.containerd.runc.v2 Oct 2 18:50:47.775920 systemd[1]: Started cri-containerd-82d6e454dfc7d8478d881245cbd51f5339b6fb8093ceccfaf986b632fbac85a0.scope. Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841949 kernel: audit: type=1400 audit(1696272647.825:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.842106 kernel: audit: type=1400 audit(1696272647.825:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.842184 kernel: audit: type=1400 audit(1696272647.825:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.850053 kernel: audit: type=1400 audit(1696272647.825:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.867858 kernel: audit: type=1400 audit(1696272647.825:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.885999 kernel: audit: type=1400 audit(1696272647.825:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.886171 kernel: audit: type=1400 audit(1696272647.825:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.834000 audit: BPF prog-id=115 op=LOAD Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2952 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:47.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832643665343534646663376438343738643838313234356362643531 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2952 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:47.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832643665343534646663376438343738643838313234356362643531 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.836000 audit: BPF prog-id=116 op=LOAD Oct 2 18:50:47.836000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2952 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:47.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832643665343534646663376438343738643838313234356362643531 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.841000 audit: BPF prog-id=117 op=LOAD Oct 2 18:50:47.841000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2952 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:47.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832643665343534646663376438343738643838313234356362643531 Oct 2 18:50:47.849000 audit: BPF prog-id=117 op=UNLOAD Oct 2 18:50:47.849000 audit: BPF prog-id=116 op=UNLOAD Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:47.849000 audit: BPF prog-id=118 op=LOAD Oct 2 18:50:47.849000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2952 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:47.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832643665343534646663376438343738643838313234356362643531 Oct 2 18:50:47.914492 env[1739]: time="2023-10-02T18:50:47.914419818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8rhz7,Uid:1c1f6bee-7f49-4cd6-968c-565f2e5ecd2d,Namespace:kube-system,Attempt:0,} returns sandbox id \"82d6e454dfc7d8478d881245cbd51f5339b6fb8093ceccfaf986b632fbac85a0\"" Oct 2 18:50:47.922660 env[1739]: time="2023-10-02T18:50:47.922604012Z" level=info msg="CreateContainer within sandbox \"82d6e454dfc7d8478d881245cbd51f5339b6fb8093ceccfaf986b632fbac85a0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 18:50:47.938488 env[1739]: time="2023-10-02T18:50:47.938432655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-zrgwp,Uid:b943fa3f-3dab-4ef4-8f69-63a34b45e595,Namespace:tigera-operator,Attempt:0,}" Oct 2 18:50:47.954749 env[1739]: time="2023-10-02T18:50:47.954430592Z" level=info msg="CreateContainer within sandbox \"82d6e454dfc7d8478d881245cbd51f5339b6fb8093ceccfaf986b632fbac85a0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a7bd955cff743093729d4a3db1b0696856f58d65f95bbdbe741c08b55e3d0af5\"" Oct 2 18:50:47.960691 env[1739]: time="2023-10-02T18:50:47.960625173Z" level=info msg="StartContainer for \"a7bd955cff743093729d4a3db1b0696856f58d65f95bbdbe741c08b55e3d0af5\"" Oct 2 18:50:47.996174 env[1739]: time="2023-10-02T18:50:47.995950854Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:47.996174 env[1739]: time="2023-10-02T18:50:47.996022120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:47.996174 env[1739]: time="2023-10-02T18:50:47.996047357Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:47.996715 env[1739]: time="2023-10-02T18:50:47.996641175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eecf57382e8337cf4158ebeb2bac5ada82fee33aae9fdc4e6ec47b4476d0166e pid=3001 runtime=io.containerd.runc.v2 Oct 2 18:50:48.016977 systemd[1]: Started cri-containerd-a7bd955cff743093729d4a3db1b0696856f58d65f95bbdbe741c08b55e3d0af5.scope. Oct 2 18:50:48.067874 systemd[1]: Started cri-containerd-eecf57382e8337cf4158ebeb2bac5ada82fee33aae9fdc4e6ec47b4476d0166e.scope. Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2952 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626439353563666637343330393337323964346133646231623036 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit: BPF prog-id=119 op=LOAD Oct 2 18:50:48.090000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2952 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626439353563666637343330393337323964346133646231623036 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit: BPF prog-id=120 op=LOAD Oct 2 18:50:48.090000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2952 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626439353563666637343330393337323964346133646231623036 Oct 2 18:50:48.090000 audit: BPF prog-id=120 op=UNLOAD Oct 2 18:50:48.090000 audit: BPF prog-id=119 op=UNLOAD Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.090000 audit: BPF prog-id=121 op=LOAD Oct 2 18:50:48.090000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2952 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626439353563666637343330393337323964346133646231623036 Oct 2 18:50:48.137241 env[1739]: time="2023-10-02T18:50:48.137098632Z" level=info msg="StartContainer for \"a7bd955cff743093729d4a3db1b0696856f58d65f95bbdbe741c08b55e3d0af5\" returns successfully" Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.150000 audit: BPF prog-id=122 op=LOAD Oct 2 18:50:48.152000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.152000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3001 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636635373338326538333337636634313538656265623262616335 Oct 2 18:50:48.152000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.152000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3001 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636635373338326538333337636634313538656265623262616335 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.153000 audit: BPF prog-id=123 op=LOAD Oct 2 18:50:48.153000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3001 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636635373338326538333337636634313538656265623262616335 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.154000 audit: BPF prog-id=124 op=LOAD Oct 2 18:50:48.154000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3001 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636635373338326538333337636634313538656265623262616335 Oct 2 18:50:48.155000 audit: BPF prog-id=124 op=UNLOAD Oct 2 18:50:48.155000 audit: BPF prog-id=123 op=UNLOAD Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:48.155000 audit: BPF prog-id=125 op=LOAD Oct 2 18:50:48.155000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3001 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565636635373338326538333337636634313538656265623262616335 Oct 2 18:50:48.224456 env[1739]: time="2023-10-02T18:50:48.224395056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-zrgwp,Uid:b943fa3f-3dab-4ef4-8f69-63a34b45e595,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"eecf57382e8337cf4158ebeb2bac5ada82fee33aae9fdc4e6ec47b4476d0166e\"" Oct 2 18:50:48.228974 env[1739]: time="2023-10-02T18:50:48.228911749Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 18:50:48.371000 audit[3083]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.371000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5906f70 a2=0 a3=ffff92c346c0 items=0 ppid=3027 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:50:48.374000 audit[3084]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.374000 audit[3084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe754e400 a2=0 a3=ffff86f9f6c0 items=0 ppid=3027 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:50:48.376000 audit[3085]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.376000 audit[3085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde71bc00 a2=0 a3=ffff8ed596c0 items=0 ppid=3027 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:50:48.378000 audit[3086]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.378000 audit[3086]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd53e0b70 a2=0 a3=ffff9b78e6c0 items=0 ppid=3027 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:50:48.380000 audit[3087]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.380000 audit[3087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeef1ad30 a2=0 a3=ffff8acd86c0 items=0 ppid=3027 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:50:48.385000 audit[3088]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.385000 audit[3088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1a71db0 a2=0 a3=ffff801916c0 items=0 ppid=3027 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:50:48.486000 audit[3090]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.486000 audit[3090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcc450510 a2=0 a3=ffffa364f6c0 items=0 ppid=3027 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:50:48.495000 audit[3092]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.495000 audit[3092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdf474980 a2=0 a3=ffffa1d306c0 items=0 ppid=3027 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 18:50:48.511000 audit[3095]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.511000 audit[3095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffec941920 a2=0 a3=ffffb9f946c0 items=0 ppid=3027 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 18:50:48.515000 audit[3096]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.515000 audit[3096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe027b350 a2=0 a3=ffff94a556c0 items=0 ppid=3027 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:50:48.523000 audit[3098]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.523000 audit[3098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd64bac70 a2=0 a3=ffff9ff8e6c0 items=0 ppid=3027 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:50:48.527000 audit[3099]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.527000 audit[3099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc73d76c0 a2=0 a3=ffffa9dc16c0 items=0 ppid=3027 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:50:48.537000 audit[3101]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.537000 audit[3101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff85717c0 a2=0 a3=ffffb57bf6c0 items=0 ppid=3027 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:50:48.551000 audit[3104]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.551000 audit[3104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc9b01200 a2=0 a3=ffffbbda66c0 items=0 ppid=3027 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 18:50:48.557000 audit[3105]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.557000 audit[3105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff70ce9b0 a2=0 a3=ffff809476c0 items=0 ppid=3027 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:50:48.574000 audit[3107]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.574000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd00e9ba0 a2=0 a3=ffffab13d6c0 items=0 ppid=3027 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:50:48.578000 audit[3108]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.578000 audit[3108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2f31ed0 a2=0 a3=ffff985f86c0 items=0 ppid=3027 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:50:48.587000 audit[3110]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.587000 audit[3110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd3b9260 a2=0 a3=ffff8d09b6c0 items=0 ppid=3027 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:48.604000 audit[3113]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.604000 audit[3113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe9a3bea0 a2=0 a3=ffffbc3846c0 items=0 ppid=3027 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:48.630170 kubelet[2866]: I1002 18:50:48.630113 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-8rhz7" podStartSLOduration=2.629996468 podCreationTimestamp="2023-10-02 18:50:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:50:48.629717193 +0000 UTC m=+15.660397305" watchObservedRunningTime="2023-10-02 18:50:48.629996468 +0000 UTC m=+15.660676580" Oct 2 18:50:48.634000 audit[3116]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.634000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff93a0650 a2=0 a3=ffff864cd6c0 items=0 ppid=3027 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:50:48.639000 audit[3117]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.639000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd1e0cd20 a2=0 a3=ffff9a3d06c0 items=0 ppid=3027 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:50:48.648000 audit[3119]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.648000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffcb147bf0 a2=0 a3=ffff88b336c0 items=0 ppid=3027 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:48.661000 audit[3122]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.661000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9446360 a2=0 a3=ffffb1a2c6c0 items=0 ppid=3027 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:48.665000 audit[3123]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.665000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb4bf4f0 a2=0 a3=ffffbd0106c0 items=0 ppid=3027 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:50:48.674000 audit[3125]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:50:48.674000 audit[3125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffcea825b0 a2=0 a3=ffffa5b716c0 items=0 ppid=3027 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:50:48.724000 audit[3131]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:48.724000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe8100fc0 a2=0 a3=ffff843d06c0 items=0 ppid=3027 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.724000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:48.735000 audit[3131]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:48.735000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe8100fc0 a2=0 a3=ffff843d06c0 items=0 ppid=3027 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:48.740000 audit[3137]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.740000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff3ebbad0 a2=0 a3=ffff88b3e6c0 items=0 ppid=3027 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:50:48.752000 audit[3139]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.752000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd3594610 a2=0 a3=ffffa49fb6c0 items=0 ppid=3027 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 18:50:48.767000 audit[3142]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.767000 audit[3142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff53fd680 a2=0 a3=ffff869c76c0 items=0 ppid=3027 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 18:50:48.771000 audit[3143]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.771000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd60114b0 a2=0 a3=ffff8afc36c0 items=0 ppid=3027 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:50:48.779000 audit[3145]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.779000 audit[3145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffde332e50 a2=0 a3=ffff9a0766c0 items=0 ppid=3027 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:50:48.783000 audit[3146]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.783000 audit[3146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4a32e00 a2=0 a3=ffffa51a86c0 items=0 ppid=3027 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:50:48.791000 audit[3148]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.791000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc15bc940 a2=0 a3=ffff8bf2e6c0 items=0 ppid=3027 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 18:50:48.803000 audit[3151]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.803000 audit[3151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8ec8350 a2=0 a3=ffff86cdb6c0 items=0 ppid=3027 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:50:48.810000 audit[3152]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.810000 audit[3152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4cdcef0 a2=0 a3=ffffad0276c0 items=0 ppid=3027 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:50:48.819000 audit[3154]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.819000 audit[3154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd9617d50 a2=0 a3=ffff80a6a6c0 items=0 ppid=3027 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:50:48.823000 audit[3155]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.823000 audit[3155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc89cf720 a2=0 a3=ffffa5e856c0 items=0 ppid=3027 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:50:48.832000 audit[3157]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.832000 audit[3157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8f35630 a2=0 a3=ffff8a4e96c0 items=0 ppid=3027 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:50:48.849000 audit[3160]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.849000 audit[3160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde3b7a10 a2=0 a3=ffff82e166c0 items=0 ppid=3027 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:50:48.866000 audit[3163]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.866000 audit[3163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc286ff70 a2=0 a3=ffffae7fc6c0 items=0 ppid=3027 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 18:50:48.871000 audit[3164]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.871000 audit[3164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6d2f350 a2=0 a3=ffff8cc366c0 items=0 ppid=3027 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:50:48.881000 audit[3166]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.881000 audit[3166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0ab89b0 a2=0 a3=ffff94f6b6c0 items=0 ppid=3027 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:48.893000 audit[3169]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.893000 audit[3169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffa01e590 a2=0 a3=ffffba9046c0 items=0 ppid=3027 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:50:48.897000 audit[3170]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.897000 audit[3170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe867f140 a2=0 a3=ffffbcd236c0 items=0 ppid=3027 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:50:48.905000 audit[3172]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.905000 audit[3172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffc8d5760 a2=0 a3=ffff9d28e6c0 items=0 ppid=3027 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:50:48.909000 audit[3173]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.909000 audit[3173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd40ffb50 a2=0 a3=ffffa85bb6c0 items=0 ppid=3027 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:50:48.918000 audit[3175]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.918000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffea3560f0 a2=0 a3=ffff9ab5e6c0 items=0 ppid=3027 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:48.929000 audit[3178]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:50:48.929000 audit[3178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd273670 a2=0 a3=ffff96aa96c0 items=0 ppid=3027 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:50:48.938000 audit[3180]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:50:48.938000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc45a2d00 a2=0 a3=ffff9e1986c0 items=0 ppid=3027 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.938000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:48.939000 audit[3180]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:50:48.939000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc45a2d00 a2=0 a3=ffff9e1986c0 items=0 ppid=3027 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:48.939000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:49.554837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount576397807.mount: Deactivated successfully. Oct 2 18:50:50.641851 env[1739]: time="2023-10-02T18:50:50.641780569Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:50.644818 env[1739]: time="2023-10-02T18:50:50.644714063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:50.648002 env[1739]: time="2023-10-02T18:50:50.647894194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:50.650781 env[1739]: time="2023-10-02T18:50:50.650730170Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:50.652218 env[1739]: time="2023-10-02T18:50:50.652173038Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 18:50:50.658915 env[1739]: time="2023-10-02T18:50:50.658857840Z" level=info msg="CreateContainer within sandbox \"eecf57382e8337cf4158ebeb2bac5ada82fee33aae9fdc4e6ec47b4476d0166e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 18:50:50.677852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2740025578.mount: Deactivated successfully. Oct 2 18:50:50.691652 env[1739]: time="2023-10-02T18:50:50.691570077Z" level=info msg="CreateContainer within sandbox \"eecf57382e8337cf4158ebeb2bac5ada82fee33aae9fdc4e6ec47b4476d0166e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7373bdfb5ae106e0c562ea77f8107738320fdcc1a161508faeff106f3d383e90\"" Oct 2 18:50:50.693110 env[1739]: time="2023-10-02T18:50:50.693032719Z" level=info msg="StartContainer for \"7373bdfb5ae106e0c562ea77f8107738320fdcc1a161508faeff106f3d383e90\"" Oct 2 18:50:50.741937 systemd[1]: Started cri-containerd-7373bdfb5ae106e0c562ea77f8107738320fdcc1a161508faeff106f3d383e90.scope. Oct 2 18:50:50.797106 kernel: kauditd_printk_skb: 303 callbacks suppressed Oct 2 18:50:50.797695 kernel: audit: type=1400 audit(1696272650.786:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.806228 kernel: audit: type=1400 audit(1696272650.787:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.816684 kernel: audit: type=1400 audit(1696272650.787:1064): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.839906 kernel: audit: type=1400 audit(1696272650.787:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.840043 kernel: audit: type=1400 audit(1696272650.787:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.848527 kernel: audit: type=1400 audit(1696272650.787:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.856934 kernel: audit: type=1400 audit(1696272650.787:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.865182 kernel: audit: type=1400 audit(1696272650.787:1069): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.883139 kernel: audit: type=1400 audit(1696272650.787:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.883252 kernel: audit: type=1400 audit(1696272650.788:1071): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.883746 env[1739]: time="2023-10-02T18:50:50.883687472Z" level=info msg="StartContainer for \"7373bdfb5ae106e0c562ea77f8107738320fdcc1a161508faeff106f3d383e90\" returns successfully" Oct 2 18:50:50.788000 audit: BPF prog-id=126 op=LOAD Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3001 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373362646662356165313036653063353632656137376638313037 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3001 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373362646662356165313036653063353632656137376638313037 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.789000 audit: BPF prog-id=127 op=LOAD Oct 2 18:50:50.789000 audit[3188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3001 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373362646662356165313036653063353632656137376638313037 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit: BPF prog-id=128 op=LOAD Oct 2 18:50:50.796000 audit[3188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3001 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373362646662356165313036653063353632656137376638313037 Oct 2 18:50:50.796000 audit: BPF prog-id=128 op=UNLOAD Oct 2 18:50:50.796000 audit: BPF prog-id=127 op=UNLOAD Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { perfmon } for pid=3188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:50.796000 audit: BPF prog-id=129 op=LOAD Oct 2 18:50:50.796000 audit[3188]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3001 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:50.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373362646662356165313036653063353632656137376638313037 Oct 2 18:50:54.421000 audit[3219]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.421000 audit[3219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffbb997c0 a2=0 a3=ffff8c8d56c0 items=0 ppid=3027 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.423000 audit[3219]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.423000 audit[3219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffbb997c0 a2=0 a3=ffff8c8d56c0 items=0 ppid=3027 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.439000 audit[3221]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.439000 audit[3221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff6fdd0c0 a2=0 a3=ffffa352b6c0 items=0 ppid=3027 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.441000 audit[3221]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:54.441000 audit[3221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff6fdd0c0 a2=0 a3=ffffa352b6c0 items=0 ppid=3027 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:54.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:54.667248 kubelet[2866]: I1002 18:50:54.667178 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-zrgwp" podStartSLOduration=5.241831791 podCreationTimestamp="2023-10-02 18:50:47 +0000 UTC" firstStartedPulling="2023-10-02 18:50:48.227774865 +0000 UTC m=+15.258454977" lastFinishedPulling="2023-10-02 18:50:50.653038452 +0000 UTC m=+17.683718564" observedRunningTime="2023-10-02 18:50:51.637442318 +0000 UTC m=+18.668122455" watchObservedRunningTime="2023-10-02 18:50:54.667095378 +0000 UTC m=+21.697775526" Oct 2 18:50:54.667910 kubelet[2866]: I1002 18:50:54.667444 2866 topology_manager.go:215] "Topology Admit Handler" podUID="faf77b83-00a4-41a0-a7cb-70c6b580a8e7" podNamespace="calico-system" podName="calico-typha-85b6bb76b5-6p56m" Oct 2 18:50:54.678282 systemd[1]: Created slice kubepods-besteffort-podfaf77b83_00a4_41a0_a7cb_70c6b580a8e7.slice. Oct 2 18:50:54.691854 kubelet[2866]: W1002 18:50:54.691804 2866 reflector.go:535] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.691854 kubelet[2866]: E1002 18:50:54.691862 2866 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.692179 kubelet[2866]: W1002 18:50:54.691815 2866 reflector.go:535] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.692357 kubelet[2866]: E1002 18:50:54.692335 2866 reflector.go:147] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.693662 kubelet[2866]: W1002 18:50:54.693601 2866 reflector.go:535] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.693662 kubelet[2866]: E1002 18:50:54.693658 2866 reflector.go:147] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.701597 kubelet[2866]: I1002 18:50:54.701477 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-tigera-ca-bundle\") pod \"calico-typha-85b6bb76b5-6p56m\" (UID: \"faf77b83-00a4-41a0-a7cb-70c6b580a8e7\") " pod="calico-system/calico-typha-85b6bb76b5-6p56m" Oct 2 18:50:54.702011 kubelet[2866]: I1002 18:50:54.701959 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f4djt\" (UniqueName: \"kubernetes.io/projected/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-kube-api-access-f4djt\") pod \"calico-typha-85b6bb76b5-6p56m\" (UID: \"faf77b83-00a4-41a0-a7cb-70c6b580a8e7\") " pod="calico-system/calico-typha-85b6bb76b5-6p56m" Oct 2 18:50:54.702373 kubelet[2866]: I1002 18:50:54.702335 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-typha-certs\") pod \"calico-typha-85b6bb76b5-6p56m\" (UID: \"faf77b83-00a4-41a0-a7cb-70c6b580a8e7\") " pod="calico-system/calico-typha-85b6bb76b5-6p56m" Oct 2 18:50:54.768323 kubelet[2866]: I1002 18:50:54.768264 2866 topology_manager.go:215] "Topology Admit Handler" podUID="f8a8578a-46a1-4952-a0b8-ac173f7da230" podNamespace="calico-system" podName="calico-node-4jkxp" Oct 2 18:50:54.778219 systemd[1]: Created slice kubepods-besteffort-podf8a8578a_46a1_4952_a0b8_ac173f7da230.slice. Oct 2 18:50:54.784573 kubelet[2866]: W1002 18:50:54.784528 2866 reflector.go:535] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.784573 kubelet[2866]: E1002 18:50:54.784581 2866 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.784834 kubelet[2866]: W1002 18:50:54.784651 2866 reflector.go:535] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.784834 kubelet[2866]: E1002 18:50:54.784675 2866 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:50:54.803094 kubelet[2866]: I1002 18:50:54.803029 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-policysync\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.803445 kubelet[2866]: I1002 18:50:54.803417 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-xtables-lock\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.803690 kubelet[2866]: I1002 18:50:54.803643 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-cni-bin-dir\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.803933 kubelet[2866]: I1002 18:50:54.803909 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-var-run-calico\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.804191 kubelet[2866]: I1002 18:50:54.804155 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-cni-net-dir\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.804465 kubelet[2866]: I1002 18:50:54.804428 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-lib-modules\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.804698 kubelet[2866]: I1002 18:50:54.804656 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-cni-log-dir\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.804934 kubelet[2866]: I1002 18:50:54.804890 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4qsbq\" (UniqueName: \"kubernetes.io/projected/f8a8578a-46a1-4952-a0b8-ac173f7da230-kube-api-access-4qsbq\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.805198 kubelet[2866]: I1002 18:50:54.805172 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f8a8578a-46a1-4952-a0b8-ac173f7da230-node-certs\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.805426 kubelet[2866]: I1002 18:50:54.805384 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-flexvol-driver-host\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.805658 kubelet[2866]: I1002 18:50:54.805615 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f8a8578a-46a1-4952-a0b8-ac173f7da230-tigera-ca-bundle\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:54.805879 kubelet[2866]: I1002 18:50:54.805836 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f8a8578a-46a1-4952-a0b8-ac173f7da230-var-lib-calico\") pod \"calico-node-4jkxp\" (UID: \"f8a8578a-46a1-4952-a0b8-ac173f7da230\") " pod="calico-system/calico-node-4jkxp" Oct 2 18:50:55.009187 kubelet[2866]: E1002 18:50:55.009047 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.009405 kubelet[2866]: W1002 18:50:55.009375 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.009575 kubelet[2866]: E1002 18:50:55.009548 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.010388 kubelet[2866]: E1002 18:50:55.010358 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.010597 kubelet[2866]: W1002 18:50:55.010564 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.010733 kubelet[2866]: E1002 18:50:55.010710 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.011453 kubelet[2866]: E1002 18:50:55.011421 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.011648 kubelet[2866]: W1002 18:50:55.011618 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.011781 kubelet[2866]: E1002 18:50:55.011759 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.012426 kubelet[2866]: E1002 18:50:55.012395 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.012652 kubelet[2866]: W1002 18:50:55.012623 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.012792 kubelet[2866]: E1002 18:50:55.012769 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.013394 kubelet[2866]: E1002 18:50:55.013359 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.013584 kubelet[2866]: W1002 18:50:55.013555 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.013737 kubelet[2866]: E1002 18:50:55.013714 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.014313 kubelet[2866]: E1002 18:50:55.014284 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.014526 kubelet[2866]: W1002 18:50:55.014497 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.014657 kubelet[2866]: E1002 18:50:55.014634 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.115483 kubelet[2866]: E1002 18:50:55.115447 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.115713 kubelet[2866]: W1002 18:50:55.115682 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.115854 kubelet[2866]: E1002 18:50:55.115831 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.116429 kubelet[2866]: E1002 18:50:55.116398 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.116652 kubelet[2866]: W1002 18:50:55.116618 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.116805 kubelet[2866]: E1002 18:50:55.116780 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.117437 kubelet[2866]: E1002 18:50:55.117404 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.117622 kubelet[2866]: W1002 18:50:55.117594 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.117776 kubelet[2866]: E1002 18:50:55.117754 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.119383 kubelet[2866]: E1002 18:50:55.119353 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.119593 kubelet[2866]: W1002 18:50:55.119566 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.119733 kubelet[2866]: E1002 18:50:55.119710 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.120284 kubelet[2866]: E1002 18:50:55.120240 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.120475 kubelet[2866]: W1002 18:50:55.120448 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.120603 kubelet[2866]: E1002 18:50:55.120581 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.121171 kubelet[2866]: E1002 18:50:55.121143 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.121440 kubelet[2866]: W1002 18:50:55.121411 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.121574 kubelet[2866]: E1002 18:50:55.121552 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.223152 kubelet[2866]: E1002 18:50:55.223116 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.223351 kubelet[2866]: W1002 18:50:55.223323 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.223479 kubelet[2866]: E1002 18:50:55.223455 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.224727 kubelet[2866]: E1002 18:50:55.224692 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.225013 kubelet[2866]: W1002 18:50:55.224982 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.225217 kubelet[2866]: E1002 18:50:55.225192 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.225780 kubelet[2866]: E1002 18:50:55.225752 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.225966 kubelet[2866]: W1002 18:50:55.225939 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.226118 kubelet[2866]: E1002 18:50:55.226095 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.226649 kubelet[2866]: E1002 18:50:55.226624 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.226823 kubelet[2866]: W1002 18:50:55.226799 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.226976 kubelet[2866]: E1002 18:50:55.226954 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.228138 kubelet[2866]: E1002 18:50:55.228101 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.228414 kubelet[2866]: W1002 18:50:55.228383 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.228553 kubelet[2866]: E1002 18:50:55.228530 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.229145 kubelet[2866]: E1002 18:50:55.229062 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.229355 kubelet[2866]: W1002 18:50:55.229327 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.229487 kubelet[2866]: E1002 18:50:55.229463 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.330578 kubelet[2866]: E1002 18:50:55.330544 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.330775 kubelet[2866]: W1002 18:50:55.330748 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.330938 kubelet[2866]: E1002 18:50:55.330903 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.331458 kubelet[2866]: E1002 18:50:55.331430 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.331674 kubelet[2866]: W1002 18:50:55.331646 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.331819 kubelet[2866]: E1002 18:50:55.331796 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.332470 kubelet[2866]: E1002 18:50:55.332444 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.332615 kubelet[2866]: W1002 18:50:55.332590 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.332740 kubelet[2866]: E1002 18:50:55.332719 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.333256 kubelet[2866]: E1002 18:50:55.333230 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.333440 kubelet[2866]: W1002 18:50:55.333411 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.333582 kubelet[2866]: E1002 18:50:55.333559 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.334894 kubelet[2866]: E1002 18:50:55.334859 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.335211 kubelet[2866]: W1002 18:50:55.335170 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.335428 kubelet[2866]: E1002 18:50:55.335398 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.336017 kubelet[2866]: E1002 18:50:55.335986 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.336301 kubelet[2866]: W1002 18:50:55.336269 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.336440 kubelet[2866]: E1002 18:50:55.336417 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.437320 kubelet[2866]: E1002 18:50:55.437286 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.437518 kubelet[2866]: W1002 18:50:55.437491 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.437642 kubelet[2866]: E1002 18:50:55.437620 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.438283 kubelet[2866]: E1002 18:50:55.438254 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.438473 kubelet[2866]: W1002 18:50:55.438446 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.438604 kubelet[2866]: E1002 18:50:55.438582 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.439733 kubelet[2866]: E1002 18:50:55.439698 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.439961 kubelet[2866]: W1002 18:50:55.439930 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.440132 kubelet[2866]: E1002 18:50:55.440110 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.441279 kubelet[2866]: E1002 18:50:55.441216 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.441279 kubelet[2866]: W1002 18:50:55.441268 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.441525 kubelet[2866]: E1002 18:50:55.441306 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.441912 kubelet[2866]: E1002 18:50:55.441873 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.441912 kubelet[2866]: W1002 18:50:55.441904 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.442124 kubelet[2866]: E1002 18:50:55.441936 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.442508 kubelet[2866]: E1002 18:50:55.442471 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.442508 kubelet[2866]: W1002 18:50:55.442500 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.442681 kubelet[2866]: E1002 18:50:55.442536 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.463000 audit[3254]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:55.463000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff63463f0 a2=0 a3=ffffb07806c0 items=0 ppid=3027 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:55.465000 audit[3254]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:50:55.465000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff63463f0 a2=0 a3=ffffb07806c0 items=0 ppid=3027 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:55.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:50:55.543833 kubelet[2866]: E1002 18:50:55.543778 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.543833 kubelet[2866]: W1002 18:50:55.543816 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.544096 kubelet[2866]: E1002 18:50:55.543852 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.544309 kubelet[2866]: E1002 18:50:55.544270 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.544309 kubelet[2866]: W1002 18:50:55.544299 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.544459 kubelet[2866]: E1002 18:50:55.544329 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.544759 kubelet[2866]: E1002 18:50:55.544720 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.544759 kubelet[2866]: W1002 18:50:55.544750 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.544920 kubelet[2866]: E1002 18:50:55.544779 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.545280 kubelet[2866]: E1002 18:50:55.545234 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.545280 kubelet[2866]: W1002 18:50:55.545272 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.545458 kubelet[2866]: E1002 18:50:55.545304 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.545751 kubelet[2866]: E1002 18:50:55.545714 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.545751 kubelet[2866]: W1002 18:50:55.545742 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.545904 kubelet[2866]: E1002 18:50:55.545770 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.546186 kubelet[2866]: E1002 18:50:55.546148 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.546186 kubelet[2866]: W1002 18:50:55.546184 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.546374 kubelet[2866]: E1002 18:50:55.546215 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.647301 kubelet[2866]: E1002 18:50:55.647174 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.647301 kubelet[2866]: W1002 18:50:55.647213 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.647301 kubelet[2866]: E1002 18:50:55.647256 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.649330 kubelet[2866]: E1002 18:50:55.649296 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.649506 kubelet[2866]: W1002 18:50:55.649478 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.649630 kubelet[2866]: E1002 18:50:55.649608 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.651298 kubelet[2866]: E1002 18:50:55.651261 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.651507 kubelet[2866]: W1002 18:50:55.651478 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.651667 kubelet[2866]: E1002 18:50:55.651646 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.652777 kubelet[2866]: E1002 18:50:55.652746 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.652947 kubelet[2866]: W1002 18:50:55.652921 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.653086 kubelet[2866]: E1002 18:50:55.653046 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.654250 kubelet[2866]: E1002 18:50:55.654217 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.654456 kubelet[2866]: W1002 18:50:55.654428 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.654604 kubelet[2866]: E1002 18:50:55.654581 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.655236 kubelet[2866]: E1002 18:50:55.655206 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.655407 kubelet[2866]: W1002 18:50:55.655380 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.655537 kubelet[2866]: E1002 18:50:55.655515 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.756343 kubelet[2866]: E1002 18:50:55.756307 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.756983 kubelet[2866]: W1002 18:50:55.756948 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.757148 kubelet[2866]: E1002 18:50:55.757124 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.757705 kubelet[2866]: E1002 18:50:55.757678 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.757848 kubelet[2866]: W1002 18:50:55.757823 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.757967 kubelet[2866]: E1002 18:50:55.757946 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.758506 kubelet[2866]: E1002 18:50:55.758479 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.758649 kubelet[2866]: W1002 18:50:55.758625 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.758792 kubelet[2866]: E1002 18:50:55.758770 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.759338 kubelet[2866]: E1002 18:50:55.759310 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.759514 kubelet[2866]: W1002 18:50:55.759488 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.759650 kubelet[2866]: E1002 18:50:55.759628 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.760148 kubelet[2866]: E1002 18:50:55.760126 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.760273 kubelet[2866]: W1002 18:50:55.760249 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.760391 kubelet[2866]: E1002 18:50:55.760369 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.760983 kubelet[2866]: E1002 18:50:55.760957 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.761166 kubelet[2866]: W1002 18:50:55.761141 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.761305 kubelet[2866]: E1002 18:50:55.761284 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.802257 kubelet[2866]: E1002 18:50:55.801684 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.802257 kubelet[2866]: W1002 18:50:55.801720 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.802257 kubelet[2866]: E1002 18:50:55.801754 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.807157 kubelet[2866]: E1002 18:50:55.804842 2866 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 18:50:55.807157 kubelet[2866]: E1002 18:50:55.804981 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-typha-certs podName:faf77b83-00a4-41a0-a7cb-70c6b580a8e7 nodeName:}" failed. No retries permitted until 2023-10-02 18:50:56.304952596 +0000 UTC m=+23.335632696 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-typha-certs") pod "calico-typha-85b6bb76b5-6p56m" (UID: "faf77b83-00a4-41a0-a7cb-70c6b580a8e7") : failed to sync secret cache: timed out waiting for the condition Oct 2 18:50:55.809923 kubelet[2866]: E1002 18:50:55.809855 2866 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:50:55.810155 kubelet[2866]: E1002 18:50:55.810022 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-tigera-ca-bundle podName:faf77b83-00a4-41a0-a7cb-70c6b580a8e7 nodeName:}" failed. No retries permitted until 2023-10-02 18:50:56.309968537 +0000 UTC m=+23.340648625 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/faf77b83-00a4-41a0-a7cb-70c6b580a8e7-tigera-ca-bundle") pod "calico-typha-85b6bb76b5-6p56m" (UID: "faf77b83-00a4-41a0-a7cb-70c6b580a8e7") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:50:55.810301 kubelet[2866]: E1002 18:50:55.810238 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.810301 kubelet[2866]: W1002 18:50:55.810259 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.810450 kubelet[2866]: E1002 18:50:55.810305 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.846289 kubelet[2866]: E1002 18:50:55.846246 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.846525 kubelet[2866]: W1002 18:50:55.846487 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.846703 kubelet[2866]: E1002 18:50:55.846678 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.863813 kubelet[2866]: E1002 18:50:55.863763 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.863813 kubelet[2866]: W1002 18:50:55.863800 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.864059 kubelet[2866]: E1002 18:50:55.863837 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.864360 kubelet[2866]: E1002 18:50:55.864324 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.864360 kubelet[2866]: W1002 18:50:55.864352 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.864523 kubelet[2866]: E1002 18:50:55.864380 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.864910 kubelet[2866]: E1002 18:50:55.864859 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.865002 kubelet[2866]: W1002 18:50:55.864911 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.865002 kubelet[2866]: E1002 18:50:55.864941 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.870239 kubelet[2866]: E1002 18:50:55.870205 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.870432 kubelet[2866]: W1002 18:50:55.870403 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.870583 kubelet[2866]: E1002 18:50:55.870543 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.966364 kubelet[2866]: E1002 18:50:55.966218 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.966364 kubelet[2866]: W1002 18:50:55.966253 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.966364 kubelet[2866]: E1002 18:50:55.966290 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.969770 kubelet[2866]: E1002 18:50:55.969732 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:55.969770 kubelet[2866]: W1002 18:50:55.969767 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:55.969991 kubelet[2866]: E1002 18:50:55.969806 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:55.990730 env[1739]: time="2023-10-02T18:50:55.990239936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jkxp,Uid:f8a8578a-46a1-4952-a0b8-ac173f7da230,Namespace:calico-system,Attempt:0,}" Oct 2 18:50:56.054974 env[1739]: time="2023-10-02T18:50:56.054492619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:56.054974 env[1739]: time="2023-10-02T18:50:56.054574058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:56.054974 env[1739]: time="2023-10-02T18:50:56.054600480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:56.055516 env[1739]: time="2023-10-02T18:50:56.055435121Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816 pid=3293 runtime=io.containerd.runc.v2 Oct 2 18:50:56.073751 kubelet[2866]: E1002 18:50:56.071265 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.073751 kubelet[2866]: W1002 18:50:56.071315 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.073751 kubelet[2866]: E1002 18:50:56.071354 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.073751 kubelet[2866]: E1002 18:50:56.071920 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.073751 kubelet[2866]: W1002 18:50:56.071944 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.073751 kubelet[2866]: E1002 18:50:56.071974 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.094273 systemd[1]: Started cri-containerd-919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816.scope. Oct 2 18:50:56.143117 kernel: kauditd_printk_skb: 65 callbacks suppressed Oct 2 18:50:56.143238 kernel: audit: type=1400 audit(1696272656.138:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.161205 kernel: audit: type=1400 audit(1696272656.138:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.170297 kernel: audit: type=1400 audit(1696272656.138:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.183164 kubelet[2866]: E1002 18:50:56.183111 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.183164 kubelet[2866]: W1002 18:50:56.183149 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.183494 kubelet[2866]: E1002 18:50:56.183188 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.183905 kubelet[2866]: E1002 18:50:56.183869 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.183905 kubelet[2866]: W1002 18:50:56.183899 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.184155 kubelet[2866]: E1002 18:50:56.183931 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.192054 kernel: audit: type=1400 audit(1696272656.138:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.192172 kernel: audit: type=1400 audit(1696272656.138:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.200160 kernel: audit: type=1400 audit(1696272656.138:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.208302 kernel: audit: type=1400 audit(1696272656.138:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.217618 kernel: audit: type=1400 audit(1696272656.138:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.220166 kernel: audit: type=1400 audit(1696272656.138:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.222054 env[1739]: time="2023-10-02T18:50:56.221990147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jkxp,Uid:f8a8578a-46a1-4952-a0b8-ac173f7da230,Namespace:calico-system,Attempt:0,} returns sandbox id \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\"" Oct 2 18:50:56.224870 env[1739]: time="2023-10-02T18:50:56.224819788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 18:50:56.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.235820 kernel: audit: type=1400 audit(1696272656.141:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.141000 audit: BPF prog-id=130 op=LOAD Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396632663162363465626131636431396631336266366139633534 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396632663162363465626131636431396631336266366139633534 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.148000 audit: BPF prog-id=131 op=LOAD Oct 2 18:50:56.148000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396632663162363465626131636431396631336266366139633534 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit: BPF prog-id=132 op=LOAD Oct 2 18:50:56.149000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396632663162363465626131636431396631336266366139633534 Oct 2 18:50:56.149000 audit: BPF prog-id=132 op=UNLOAD Oct 2 18:50:56.149000 audit: BPF prog-id=131 op=UNLOAD Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.149000 audit: BPF prog-id=133 op=LOAD Oct 2 18:50:56.149000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396632663162363465626131636431396631336266366139633534 Oct 2 18:50:56.284866 kubelet[2866]: E1002 18:50:56.284823 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.285017 kubelet[2866]: W1002 18:50:56.284879 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.285017 kubelet[2866]: E1002 18:50:56.284916 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.285452 kubelet[2866]: E1002 18:50:56.285421 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.285538 kubelet[2866]: W1002 18:50:56.285449 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.285538 kubelet[2866]: E1002 18:50:56.285504 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.386794 kubelet[2866]: E1002 18:50:56.386748 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.386794 kubelet[2866]: W1002 18:50:56.386785 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.387060 kubelet[2866]: E1002 18:50:56.386821 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.387431 kubelet[2866]: E1002 18:50:56.387399 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.387431 kubelet[2866]: W1002 18:50:56.387429 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.387624 kubelet[2866]: E1002 18:50:56.387469 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.387952 kubelet[2866]: E1002 18:50:56.387909 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.387952 kubelet[2866]: W1002 18:50:56.387949 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.388139 kubelet[2866]: E1002 18:50:56.387986 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.388422 kubelet[2866]: E1002 18:50:56.388379 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.388422 kubelet[2866]: W1002 18:50:56.388416 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.388631 kubelet[2866]: E1002 18:50:56.388589 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.388784 kubelet[2866]: E1002 18:50:56.388760 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.388784 kubelet[2866]: W1002 18:50:56.388784 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.388958 kubelet[2866]: E1002 18:50:56.388816 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.389276 kubelet[2866]: E1002 18:50:56.389218 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.389276 kubelet[2866]: W1002 18:50:56.389267 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.389439 kubelet[2866]: E1002 18:50:56.389303 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.389797 kubelet[2866]: E1002 18:50:56.389768 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.389913 kubelet[2866]: W1002 18:50:56.389798 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.389913 kubelet[2866]: E1002 18:50:56.389839 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.390313 kubelet[2866]: E1002 18:50:56.390273 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.390419 kubelet[2866]: W1002 18:50:56.390312 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.390487 kubelet[2866]: E1002 18:50:56.390457 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.392361 kubelet[2866]: E1002 18:50:56.392308 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.392361 kubelet[2866]: W1002 18:50:56.392346 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.392585 kubelet[2866]: E1002 18:50:56.392395 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.392851 kubelet[2866]: E1002 18:50:56.392818 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.392947 kubelet[2866]: W1002 18:50:56.392856 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.392947 kubelet[2866]: E1002 18:50:56.392890 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.394133 kubelet[2866]: E1002 18:50:56.393951 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.394133 kubelet[2866]: W1002 18:50:56.393980 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.394133 kubelet[2866]: E1002 18:50:56.394012 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.402771 kubelet[2866]: E1002 18:50:56.402736 2866 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:50:56.402964 kubelet[2866]: W1002 18:50:56.402937 2866 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:50:56.403108 kubelet[2866]: E1002 18:50:56.403084 2866 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:50:56.493590 env[1739]: time="2023-10-02T18:50:56.490024052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85b6bb76b5-6p56m,Uid:faf77b83-00a4-41a0-a7cb-70c6b580a8e7,Namespace:calico-system,Attempt:0,}" Oct 2 18:50:56.537646 env[1739]: time="2023-10-02T18:50:56.537516368Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:50:56.537865 env[1739]: time="2023-10-02T18:50:56.537678850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:50:56.537865 env[1739]: time="2023-10-02T18:50:56.537765799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:50:56.539888 env[1739]: time="2023-10-02T18:50:56.539653406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c62bb10498558eefbf43fe0dfe5be7c3040640e7628eeb6022144a747c4f30d0 pid=3354 runtime=io.containerd.runc.v2 Oct 2 18:50:56.577562 systemd[1]: Started cri-containerd-c62bb10498558eefbf43fe0dfe5be7c3040640e7628eeb6022144a747c4f30d0.scope. Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.620000 audit: BPF prog-id=134 op=LOAD Oct 2 18:50:56.623000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.623000 audit[3366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=3354 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336326262313034393835353865656662663433666530646665356265 Oct 2 18:50:56.623000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.623000 audit[3366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3354 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336326262313034393835353865656662663433666530646665356265 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.624000 audit: BPF prog-id=135 op=LOAD Oct 2 18:50:56.624000 audit[3366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=3354 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336326262313034393835353865656662663433666530646665356265 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.626000 audit: BPF prog-id=136 op=LOAD Oct 2 18:50:56.626000 audit[3366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=3354 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336326262313034393835353865656662663433666530646665356265 Oct 2 18:50:56.627000 audit: BPF prog-id=136 op=UNLOAD Oct 2 18:50:56.627000 audit: BPF prog-id=135 op=UNLOAD Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:56.628000 audit: BPF prog-id=137 op=LOAD Oct 2 18:50:56.628000 audit[3366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=3354 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:56.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336326262313034393835353865656662663433666530646665356265 Oct 2 18:50:56.686649 env[1739]: time="2023-10-02T18:50:56.686588449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85b6bb76b5-6p56m,Uid:faf77b83-00a4-41a0-a7cb-70c6b580a8e7,Namespace:calico-system,Attempt:0,} returns sandbox id \"c62bb10498558eefbf43fe0dfe5be7c3040640e7628eeb6022144a747c4f30d0\"" Oct 2 18:50:57.640171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1683190851.mount: Deactivated successfully. Oct 2 18:50:57.820883 env[1739]: time="2023-10-02T18:50:57.820805361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:57.825827 env[1739]: time="2023-10-02T18:50:57.825763319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:57.830239 env[1739]: time="2023-10-02T18:50:57.830169205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:57.834035 env[1739]: time="2023-10-02T18:50:57.833968962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:50:57.836463 env[1739]: time="2023-10-02T18:50:57.835297482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 18:50:57.837721 env[1739]: time="2023-10-02T18:50:57.837484273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 18:50:57.842338 env[1739]: time="2023-10-02T18:50:57.842260736Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 18:50:57.875314 env[1739]: time="2023-10-02T18:50:57.875218645Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771\"" Oct 2 18:50:57.876433 env[1739]: time="2023-10-02T18:50:57.876365166Z" level=info msg="StartContainer for \"73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771\"" Oct 2 18:50:57.943777 systemd[1]: Started cri-containerd-73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771.scope. Oct 2 18:50:57.959394 systemd[1]: run-containerd-runc-k8s.io-73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771-runc.cLqHsq.mount: Deactivated successfully. Oct 2 18:50:58.039000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.039000 audit[3394]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3293 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:58.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733616234626338383565623439333664383535626439333363633861 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit: BPF prog-id=138 op=LOAD Oct 2 18:50:58.040000 audit[3394]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3293 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:58.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733616234626338383565623439333664383535626439333363633861 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit: BPF prog-id=139 op=LOAD Oct 2 18:50:58.040000 audit[3394]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3293 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:58.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733616234626338383565623439333664383535626439333363633861 Oct 2 18:50:58.040000 audit: BPF prog-id=139 op=UNLOAD Oct 2 18:50:58.040000 audit: BPF prog-id=138 op=UNLOAD Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:58.040000 audit: BPF prog-id=140 op=LOAD Oct 2 18:50:58.040000 audit[3394]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3293 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:58.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733616234626338383565623439333664383535626439333363633861 Oct 2 18:50:58.088707 env[1739]: time="2023-10-02T18:50:58.088626812Z" level=info msg="StartContainer for \"73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771\" returns successfully" Oct 2 18:50:58.121802 systemd[1]: cri-containerd-73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771.scope: Deactivated successfully. Oct 2 18:50:58.125000 audit: BPF prog-id=140 op=UNLOAD Oct 2 18:50:58.451137 env[1739]: time="2023-10-02T18:50:58.451039214Z" level=info msg="shim disconnected" id=73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771 Oct 2 18:50:58.451509 env[1739]: time="2023-10-02T18:50:58.451476028Z" level=warning msg="cleaning up after shim disconnected" id=73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771 namespace=k8s.io Oct 2 18:50:58.451649 env[1739]: time="2023-10-02T18:50:58.451620068Z" level=info msg="cleaning up dead shim" Oct 2 18:50:58.478489 env[1739]: time="2023-10-02T18:50:58.478411492Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:50:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3434 runtime=io.containerd.runc.v2\n" Oct 2 18:50:58.861807 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-73ab4bc885eb4936d855bd933cc8aea0a2494d946bf69d9dae77db8759c5e771-rootfs.mount: Deactivated successfully. Oct 2 18:50:59.202719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2840293447.mount: Deactivated successfully. Oct 2 18:51:00.199450 env[1739]: time="2023-10-02T18:51:00.199380651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:00.203214 env[1739]: time="2023-10-02T18:51:00.203164264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:00.207013 env[1739]: time="2023-10-02T18:51:00.206950409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:00.209178 env[1739]: time="2023-10-02T18:51:00.209129986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:00.210360 env[1739]: time="2023-10-02T18:51:00.210273949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 18:51:00.217194 env[1739]: time="2023-10-02T18:51:00.217038431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 18:51:00.221227 env[1739]: time="2023-10-02T18:51:00.221169133Z" level=info msg="CreateContainer within sandbox \"c62bb10498558eefbf43fe0dfe5be7c3040640e7628eeb6022144a747c4f30d0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 18:51:00.249353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount806822153.mount: Deactivated successfully. Oct 2 18:51:00.264259 env[1739]: time="2023-10-02T18:51:00.264186977Z" level=info msg="CreateContainer within sandbox \"c62bb10498558eefbf43fe0dfe5be7c3040640e7628eeb6022144a747c4f30d0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"054f3a78c5ba00646cf86798502a5a38316d49627bc361ec18f30b8078a19164\"" Oct 2 18:51:00.267277 env[1739]: time="2023-10-02T18:51:00.266414319Z" level=info msg="StartContainer for \"054f3a78c5ba00646cf86798502a5a38316d49627bc361ec18f30b8078a19164\"" Oct 2 18:51:00.331232 systemd[1]: Started cri-containerd-054f3a78c5ba00646cf86798502a5a38316d49627bc361ec18f30b8078a19164.scope. Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.382000 audit: BPF prog-id=141 op=LOAD Oct 2 18:51:00.383000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.383000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3354 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346633613738633562613030363436636638363739383530326135 Oct 2 18:51:00.383000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.383000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3354 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346633613738633562613030363436636638363739383530326135 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.384000 audit: BPF prog-id=142 op=LOAD Oct 2 18:51:00.384000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3354 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346633613738633562613030363436636638363739383530326135 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.385000 audit: BPF prog-id=143 op=LOAD Oct 2 18:51:00.385000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3354 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346633613738633562613030363436636638363739383530326135 Oct 2 18:51:00.386000 audit: BPF prog-id=143 op=UNLOAD Oct 2 18:51:00.387000 audit: BPF prog-id=142 op=UNLOAD Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:00.387000 audit: BPF prog-id=144 op=LOAD Oct 2 18:51:00.387000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3354 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346633613738633562613030363436636638363739383530326135 Oct 2 18:51:00.423979 env[1739]: time="2023-10-02T18:51:00.423899202Z" level=info msg="StartContainer for \"054f3a78c5ba00646cf86798502a5a38316d49627bc361ec18f30b8078a19164\" returns successfully" Oct 2 18:51:00.676008 kubelet[2866]: I1002 18:51:00.674863 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-85b6bb76b5-6p56m" podStartSLOduration=3.152710045 podCreationTimestamp="2023-10-02 18:50:54 +0000 UTC" firstStartedPulling="2023-10-02 18:50:56.688924798 +0000 UTC m=+23.719604898" lastFinishedPulling="2023-10-02 18:51:00.211024019 +0000 UTC m=+27.241704119" observedRunningTime="2023-10-02 18:51:00.673132592 +0000 UTC m=+27.703812740" watchObservedRunningTime="2023-10-02 18:51:00.674809266 +0000 UTC m=+27.705489390" Oct 2 18:51:00.730000 audit[3491]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:00.730000 audit[3491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff0956380 a2=0 a3=ffff891da6c0 items=0 ppid=3027 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:00.732000 audit[3491]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:00.732000 audit[3491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=fffff0956380 a2=0 a3=ffff891da6c0 items=0 ppid=3027 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:00.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:01.454404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount598114538.mount: Deactivated successfully. Oct 2 18:51:05.124742 env[1739]: time="2023-10-02T18:51:05.124663738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:05.127900 env[1739]: time="2023-10-02T18:51:05.127821832Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:05.132142 env[1739]: time="2023-10-02T18:51:05.132040034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:05.136244 env[1739]: time="2023-10-02T18:51:05.136185589Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:05.137425 env[1739]: time="2023-10-02T18:51:05.137362783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 18:51:05.143559 env[1739]: time="2023-10-02T18:51:05.143505191Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 18:51:05.170406 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount708782018.mount: Deactivated successfully. Oct 2 18:51:05.179649 env[1739]: time="2023-10-02T18:51:05.179576339Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b\"" Oct 2 18:51:05.184260 env[1739]: time="2023-10-02T18:51:05.184127156Z" level=info msg="StartContainer for \"c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b\"" Oct 2 18:51:05.252829 systemd[1]: Started cri-containerd-c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b.scope. Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317740 kernel: kauditd_printk_skb: 211 callbacks suppressed Oct 2 18:51:05.317910 kernel: audit: type=1400 audit(1696272665.314:1149): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:05.337913 kernel: audit: type=1300 audit(1696272665.314:1149): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:05.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 Oct 2 18:51:05.349670 kernel: audit: type=1327 audit(1696272665.314:1149): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.359569 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.368324 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.376508 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.376661 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.394700 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.394828 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.410756 kernel: audit: type=1400 audit(1696272665.314:1150): avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.314000 audit: BPF prog-id=145 op=LOAD Oct 2 18:51:05.314000 audit[3501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:05.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.317000 audit: BPF prog-id=146 op=LOAD Oct 2 18:51:05.317000 audit[3501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:05.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 Oct 2 18:51:05.324000 audit: BPF prog-id=146 op=UNLOAD Oct 2 18:51:05.324000 audit: BPF prog-id=145 op=UNLOAD Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:05.324000 audit: BPF prog-id=147 op=LOAD Oct 2 18:51:05.324000 audit[3501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3293 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:05.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396663663731633139373364353631633337383034303264353833 Oct 2 18:51:05.423256 env[1739]: time="2023-10-02T18:51:05.423159130Z" level=info msg="StartContainer for \"c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b\" returns successfully" Oct 2 18:51:06.160206 systemd[1]: run-containerd-runc-k8s.io-c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b-runc.td8JAw.mount: Deactivated successfully. Oct 2 18:51:06.525249 env[1739]: time="2023-10-02T18:51:06.525152704Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:51:06.531400 systemd[1]: cri-containerd-c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b.scope: Deactivated successfully. Oct 2 18:51:06.535000 audit: BPF prog-id=147 op=UNLOAD Oct 2 18:51:06.583773 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b-rootfs.mount: Deactivated successfully. Oct 2 18:51:06.598541 kubelet[2866]: I1002 18:51:06.598498 2866 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 18:51:06.657232 kubelet[2866]: I1002 18:51:06.657161 2866 topology_manager.go:215] "Topology Admit Handler" podUID="133bdbd8-1ee8-4bbd-a7a3-6228eefcb813" podNamespace="kube-system" podName="coredns-5dd5756b68-k72xn" Oct 2 18:51:06.668423 kubelet[2866]: I1002 18:51:06.668306 2866 topology_manager.go:215] "Topology Admit Handler" podUID="3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc" podNamespace="kube-system" podName="coredns-5dd5756b68-wgjbl" Oct 2 18:51:06.672813 systemd[1]: Created slice kubepods-burstable-pod133bdbd8_1ee8_4bbd_a7a3_6228eefcb813.slice. Oct 2 18:51:06.681823 kubelet[2866]: I1002 18:51:06.681047 2866 topology_manager.go:215] "Topology Admit Handler" podUID="eaa778dd-c0ca-40d3-87cc-9e89e186ed0a" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-524h6" Oct 2 18:51:06.692120 kubelet[2866]: W1002 18:51:06.692030 2866 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:51:06.692120 kubelet[2866]: E1002 18:51:06.692104 2866 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-21-44" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-21-44' and this object Oct 2 18:51:06.707020 systemd[1]: Created slice kubepods-burstable-pod3ac7c3cc_77d6_4e74_8e6d_6d885fbc5dfc.slice. Oct 2 18:51:06.747343 kubelet[2866]: I1002 18:51:06.747294 2866 topology_manager.go:215] "Topology Admit Handler" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" podNamespace="calico-system" podName="csi-node-driver-m7c2m" Oct 2 18:51:06.754356 systemd[1]: Created slice kubepods-besteffort-podeaa778dd_c0ca_40d3_87cc_9e89e186ed0a.slice. Oct 2 18:51:06.771543 kubelet[2866]: I1002 18:51:06.771499 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-82cjf\" (UniqueName: \"kubernetes.io/projected/3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc-kube-api-access-82cjf\") pod \"coredns-5dd5756b68-wgjbl\" (UID: \"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc\") " pod="kube-system/coredns-5dd5756b68-wgjbl" Oct 2 18:51:06.772376 kubelet[2866]: I1002 18:51:06.772333 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/133bdbd8-1ee8-4bbd-a7a3-6228eefcb813-config-volume\") pod \"coredns-5dd5756b68-k72xn\" (UID: \"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813\") " pod="kube-system/coredns-5dd5756b68-k72xn" Oct 2 18:51:06.772742 kubelet[2866]: I1002 18:51:06.772713 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c9dpg\" (UniqueName: \"kubernetes.io/projected/133bdbd8-1ee8-4bbd-a7a3-6228eefcb813-kube-api-access-c9dpg\") pod \"coredns-5dd5756b68-k72xn\" (UID: \"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813\") " pod="kube-system/coredns-5dd5756b68-k72xn" Oct 2 18:51:06.772940 kubelet[2866]: I1002 18:51:06.772917 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nfvcn\" (UniqueName: \"kubernetes.io/projected/eaa778dd-c0ca-40d3-87cc-9e89e186ed0a-kube-api-access-nfvcn\") pod \"calico-kube-controllers-74b9887bb6-524h6\" (UID: \"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a\") " pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" Oct 2 18:51:06.773491 kubelet[2866]: I1002 18:51:06.773461 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc-config-volume\") pod \"coredns-5dd5756b68-wgjbl\" (UID: \"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc\") " pod="kube-system/coredns-5dd5756b68-wgjbl" Oct 2 18:51:06.782561 systemd[1]: Created slice kubepods-besteffort-pod8f2df03e_78e3_4fc8_a756_5eb3c0cbf4d6.slice. Oct 2 18:51:06.874048 kubelet[2866]: I1002 18:51:06.873983 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-kubelet-dir\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:06.874276 kubelet[2866]: I1002 18:51:06.874102 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwmd6\" (UniqueName: \"kubernetes.io/projected/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-kube-api-access-lwmd6\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:06.874276 kubelet[2866]: I1002 18:51:06.874199 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-registration-dir\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:06.874446 kubelet[2866]: I1002 18:51:06.874348 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-varrun\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:06.874446 kubelet[2866]: I1002 18:51:06.874422 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-etccalico\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:06.874609 kubelet[2866]: I1002 18:51:06.874527 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6-socket-dir\") pod \"csi-node-driver-m7c2m\" (UID: \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\") " pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:07.070201 env[1739]: time="2023-10-02T18:51:07.069946811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-524h6,Uid:eaa778dd-c0ca-40d3-87cc-9e89e186ed0a,Namespace:calico-system,Attempt:0,}" Oct 2 18:51:07.089042 env[1739]: time="2023-10-02T18:51:07.088976867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7c2m,Uid:8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6,Namespace:calico-system,Attempt:0,}" Oct 2 18:51:07.864382 env[1739]: time="2023-10-02T18:51:07.864306795Z" level=info msg="shim disconnected" id=c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b Oct 2 18:51:07.864382 env[1739]: time="2023-10-02T18:51:07.864377977Z" level=warning msg="cleaning up after shim disconnected" id=c19fcf71c1973d561c3780402d583744b4c992b43b6d10280b292e2b7322c76b namespace=k8s.io Oct 2 18:51:07.865143 env[1739]: time="2023-10-02T18:51:07.864400448Z" level=info msg="cleaning up dead shim" Oct 2 18:51:07.881040 kubelet[2866]: E1002 18:51:07.880704 2866 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:07.885955 kubelet[2866]: E1002 18:51:07.880705 2866 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:07.885955 kubelet[2866]: E1002 18:51:07.882353 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc-config-volume podName:3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc nodeName:}" failed. No retries permitted until 2023-10-02 18:51:08.380787255 +0000 UTC m=+35.411467355 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc-config-volume") pod "coredns-5dd5756b68-wgjbl" (UID: "3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:07.885955 kubelet[2866]: E1002 18:51:07.882468 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/133bdbd8-1ee8-4bbd-a7a3-6228eefcb813-config-volume podName:133bdbd8-1ee8-4bbd-a7a3-6228eefcb813 nodeName:}" failed. No retries permitted until 2023-10-02 18:51:08.38244412 +0000 UTC m=+35.413124208 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/133bdbd8-1ee8-4bbd-a7a3-6228eefcb813-config-volume") pod "coredns-5dd5756b68-k72xn" (UID: "133bdbd8-1ee8-4bbd-a7a3-6228eefcb813") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:51:07.969297 env[1739]: time="2023-10-02T18:51:07.969218222Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:51:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3552 runtime=io.containerd.runc.v2\n" Oct 2 18:51:08.084116 env[1739]: time="2023-10-02T18:51:08.083975134Z" level=error msg="Failed to destroy network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.084917 env[1739]: time="2023-10-02T18:51:08.084835043Z" level=error msg="encountered an error cleaning up failed sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.085189 env[1739]: time="2023-10-02T18:51:08.084941672Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-524h6,Uid:eaa778dd-c0ca-40d3-87cc-9e89e186ed0a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.085935 kubelet[2866]: E1002 18:51:08.085588 2866 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.085935 kubelet[2866]: E1002 18:51:08.085695 2866 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" Oct 2 18:51:08.085935 kubelet[2866]: E1002 18:51:08.085760 2866 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" Oct 2 18:51:08.086388 kubelet[2866]: E1002 18:51:08.085871 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-524h6_calico-system(eaa778dd-c0ca-40d3-87cc-9e89e186ed0a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-524h6_calico-system(eaa778dd-c0ca-40d3-87cc-9e89e186ed0a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" podUID="eaa778dd-c0ca-40d3-87cc-9e89e186ed0a" Oct 2 18:51:08.104827 env[1739]: time="2023-10-02T18:51:08.104750751Z" level=error msg="Failed to destroy network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.105678 env[1739]: time="2023-10-02T18:51:08.105622111Z" level=error msg="encountered an error cleaning up failed sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.105904 env[1739]: time="2023-10-02T18:51:08.105838658Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7c2m,Uid:8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.106408 kubelet[2866]: E1002 18:51:08.106346 2866 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.106543 kubelet[2866]: E1002 18:51:08.106430 2866 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:08.106543 kubelet[2866]: E1002 18:51:08.106476 2866 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7c2m" Oct 2 18:51:08.106671 kubelet[2866]: E1002 18:51:08.106572 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:08.160326 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6-shm.mount: Deactivated successfully. Oct 2 18:51:08.160512 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5-shm.mount: Deactivated successfully. Oct 2 18:51:08.494312 env[1739]: time="2023-10-02T18:51:08.494106549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-k72xn,Uid:133bdbd8-1ee8-4bbd-a7a3-6228eefcb813,Namespace:kube-system,Attempt:0,}" Oct 2 18:51:08.546881 env[1739]: time="2023-10-02T18:51:08.546813347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wgjbl,Uid:3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc,Namespace:kube-system,Attempt:0,}" Oct 2 18:51:08.698010 kubelet[2866]: I1002 18:51:08.697948 2866 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:08.703377 env[1739]: time="2023-10-02T18:51:08.703236048Z" level=info msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" Oct 2 18:51:08.705467 kubelet[2866]: I1002 18:51:08.705400 2866 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:08.709315 env[1739]: time="2023-10-02T18:51:08.708954057Z" level=info msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" Oct 2 18:51:08.720590 env[1739]: time="2023-10-02T18:51:08.720448211Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 18:51:08.745510 env[1739]: time="2023-10-02T18:51:08.745329500Z" level=error msg="Failed to destroy network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.749325 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2-shm.mount: Deactivated successfully. Oct 2 18:51:08.755310 env[1739]: time="2023-10-02T18:51:08.755218243Z" level=error msg="encountered an error cleaning up failed sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.755485 env[1739]: time="2023-10-02T18:51:08.755333659Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-k72xn,Uid:133bdbd8-1ee8-4bbd-a7a3-6228eefcb813,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.755709 kubelet[2866]: E1002 18:51:08.755657 2866 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.755819 kubelet[2866]: E1002 18:51:08.755737 2866 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-k72xn" Oct 2 18:51:08.755819 kubelet[2866]: E1002 18:51:08.755779 2866 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-k72xn" Oct 2 18:51:08.755971 kubelet[2866]: E1002 18:51:08.755884 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-k72xn_kube-system(133bdbd8-1ee8-4bbd-a7a3-6228eefcb813)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-k72xn_kube-system(133bdbd8-1ee8-4bbd-a7a3-6228eefcb813)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-k72xn" podUID="133bdbd8-1ee8-4bbd-a7a3-6228eefcb813" Oct 2 18:51:08.796592 env[1739]: time="2023-10-02T18:51:08.796512754Z" level=error msg="Failed to destroy network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.797606 env[1739]: time="2023-10-02T18:51:08.797531339Z" level=error msg="encountered an error cleaning up failed sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.797911 env[1739]: time="2023-10-02T18:51:08.797847169Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wgjbl,Uid:3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.798416 kubelet[2866]: E1002 18:51:08.798374 2866 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.798551 kubelet[2866]: E1002 18:51:08.798470 2866 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wgjbl" Oct 2 18:51:08.798551 kubelet[2866]: E1002 18:51:08.798508 2866 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wgjbl" Oct 2 18:51:08.798694 kubelet[2866]: E1002 18:51:08.798583 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-wgjbl_kube-system(3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-wgjbl_kube-system(3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wgjbl" podUID="3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc" Oct 2 18:51:08.879052 env[1739]: time="2023-10-02T18:51:08.878958330Z" level=error msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" failed" error="failed to destroy network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.879743 kubelet[2866]: E1002 18:51:08.879488 2866 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:08.879743 kubelet[2866]: E1002 18:51:08.879731 2866 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5"} Oct 2 18:51:08.879998 kubelet[2866]: E1002 18:51:08.879823 2866 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:08.879998 kubelet[2866]: E1002 18:51:08.879905 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" podUID="eaa778dd-c0ca-40d3-87cc-9e89e186ed0a" Oct 2 18:51:08.884556 env[1739]: time="2023-10-02T18:51:08.884480236Z" level=error msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" failed" error="failed to destroy network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:08.885195 kubelet[2866]: E1002 18:51:08.885155 2866 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:08.885708 kubelet[2866]: E1002 18:51:08.885247 2866 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6"} Oct 2 18:51:08.885708 kubelet[2866]: E1002 18:51:08.885355 2866 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:08.885708 kubelet[2866]: E1002 18:51:08.885456 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:09.160420 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae-shm.mount: Deactivated successfully. Oct 2 18:51:09.721134 kubelet[2866]: I1002 18:51:09.720345 2866 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:09.723971 env[1739]: time="2023-10-02T18:51:09.721846274Z" level=info msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" Oct 2 18:51:09.728365 kubelet[2866]: I1002 18:51:09.728310 2866 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:09.733221 env[1739]: time="2023-10-02T18:51:09.732975737Z" level=info msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" Oct 2 18:51:09.827696 env[1739]: time="2023-10-02T18:51:09.827541545Z" level=error msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" failed" error="failed to destroy network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:09.828467 kubelet[2866]: E1002 18:51:09.828238 2866 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:09.828467 kubelet[2866]: E1002 18:51:09.828309 2866 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2"} Oct 2 18:51:09.828467 kubelet[2866]: E1002 18:51:09.828377 2866 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:09.828467 kubelet[2866]: E1002 18:51:09.828432 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-k72xn" podUID="133bdbd8-1ee8-4bbd-a7a3-6228eefcb813" Oct 2 18:51:09.848515 env[1739]: time="2023-10-02T18:51:09.848331800Z" level=error msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" failed" error="failed to destroy network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 18:51:09.848895 kubelet[2866]: E1002 18:51:09.848840 2866 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:09.849018 kubelet[2866]: E1002 18:51:09.848945 2866 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae"} Oct 2 18:51:09.849138 kubelet[2866]: E1002 18:51:09.849038 2866 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 18:51:09.849284 kubelet[2866]: E1002 18:51:09.849143 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wgjbl" podUID="3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc" Oct 2 18:51:14.893455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1429982562.mount: Deactivated successfully. Oct 2 18:51:14.998699 env[1739]: time="2023-10-02T18:51:14.998618345Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:15.001658 env[1739]: time="2023-10-02T18:51:15.001584027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:15.004462 env[1739]: time="2023-10-02T18:51:15.004397884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:15.007593 env[1739]: time="2023-10-02T18:51:15.007535546Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:15.009371 env[1739]: time="2023-10-02T18:51:15.009264316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 18:51:15.018837 env[1739]: time="2023-10-02T18:51:15.018750462Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 18:51:15.059572 env[1739]: time="2023-10-02T18:51:15.059489035Z" level=info msg="CreateContainer within sandbox \"919f2f1b64eba1cd19f13bf6a9c543e2b24eb1573572cb75ffb5ba6f86185816\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7\"" Oct 2 18:51:15.063416 env[1739]: time="2023-10-02T18:51:15.063360490Z" level=info msg="StartContainer for \"1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7\"" Oct 2 18:51:15.129259 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.9OxwSh.mount: Deactivated successfully. Oct 2 18:51:15.137618 systemd[1]: Started cri-containerd-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7.scope. Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.191543 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 18:51:15.191659 kernel: audit: type=1400 audit(1696272675.188:1156): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:15.212242 kernel: audit: type=1300 audit(1696272675.188:1156): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:15.212493 kernel: audit: type=1327 audit(1696272675.188:1156): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 Oct 2 18:51:15.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.231025 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.239906 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.250144 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.260791 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.269191 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.279196 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit: BPF prog-id=148 op=LOAD Oct 2 18:51:15.289892 kernel: audit: type=1400 audit(1696272675.188:1157): avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.188000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001cd8e0 a2=78 a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:15.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.190000 audit: BPF prog-id=149 op=LOAD Oct 2 18:51:15.190000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001cd670 a2=78 a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:15.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 Oct 2 18:51:15.198000 audit: BPF prog-id=149 op=UNLOAD Oct 2 18:51:15.198000 audit: BPF prog-id=148 op=UNLOAD Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:15.198000 audit: BPF prog-id=150 op=LOAD Oct 2 18:51:15.198000 audit[3780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001cdb40 a2=78 a3=0 items=0 ppid=3293 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:15.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376132386433323139623437663264336130323762323939326433 Oct 2 18:51:15.292530 env[1739]: time="2023-10-02T18:51:15.292427198Z" level=info msg="StartContainer for \"1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7\" returns successfully" Oct 2 18:51:15.434646 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 18:51:15.434826 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 18:51:16.037681 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.Veu9OF.mount: Deactivated successfully. Oct 2 18:51:16.890435 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.EQsC3p.mount: Deactivated successfully. Oct 2 18:51:17.375000 audit[3945]: AVC avc: denied { write } for pid=3945 comm="tee" name="fd" dev="proc" ino=20983 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.375000 audit[3945]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1bb0973 a2=241 a3=1b6 items=1 ppid=3919 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.375000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 18:51:17.375000 audit: PATH item=0 name="/dev/fd/63" inode=20089 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.375000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.444000 audit[3961]: AVC avc: denied { write } for pid=3961 comm="tee" name="fd" dev="proc" ino=20998 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.444000 audit[3961]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc735d985 a2=241 a3=1b6 items=1 ppid=3915 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.444000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 18:51:17.444000 audit: PATH item=0 name="/dev/fd/63" inode=20980 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.444000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.451000 audit[3967]: AVC avc: denied { write } for pid=3967 comm="tee" name="fd" dev="proc" ino=21004 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.451000 audit[3967]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3404983 a2=241 a3=1b6 items=1 ppid=3912 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.451000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 18:51:17.457000 audit[3970]: AVC avc: denied { write } for pid=3970 comm="tee" name="fd" dev="proc" ino=20116 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.457000 audit[3970]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcfc6f983 a2=241 a3=1b6 items=1 ppid=3909 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.457000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 18:51:17.457000 audit: PATH item=0 name="/dev/fd/63" inode=20988 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.457000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.451000 audit: PATH item=0 name="/dev/fd/63" inode=20985 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.451000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.476000 audit[3978]: AVC avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=20120 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.476000 audit[3978]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8948984 a2=241 a3=1b6 items=1 ppid=3921 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.476000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 18:51:17.476000 audit: PATH item=0 name="/dev/fd/63" inode=20106 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.505000 audit[3982]: AVC avc: denied { write } for pid=3982 comm="tee" name="fd" dev="proc" ino=21008 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.505000 audit[3982]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6043983 a2=241 a3=1b6 items=1 ppid=3916 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.505000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 18:51:17.505000 audit: PATH item=0 name="/dev/fd/63" inode=21000 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.505000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:17.516000 audit[3985]: AVC avc: denied { write } for pid=3985 comm="tee" name="fd" dev="proc" ino=20124 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:51:17.516000 audit[3985]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc20e974 a2=241 a3=1b6 items=1 ppid=3923 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:17.516000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 18:51:17.516000 audit: PATH item=0 name="/dev/fd/63" inode=21001 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:51:17.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:51:18.362963 (udev-worker)[3814]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:51:18.367514 (udev-worker)[4051]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.368000 audit: BPF prog-id=151 op=LOAD Oct 2 18:51:18.368000 audit[4053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffebf59678 a2=70 a3=0 items=0 ppid=3910 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.368000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:18.369000 audit: BPF prog-id=151 op=UNLOAD Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit: BPF prog-id=152 op=LOAD Oct 2 18:51:18.369000 audit[4053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffebf59678 a2=70 a3=4a174c items=0 ppid=3910 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.369000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:18.369000 audit: BPF prog-id=152 op=UNLOAD Oct 2 18:51:18.369000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.369000 audit[4053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffebf596a8 a2=70 a3=186c973f items=0 ppid=3910 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.369000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.370000 audit: BPF prog-id=153 op=LOAD Oct 2 18:51:18.370000 audit[4053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffebf595f8 a2=70 a3=186c9759 items=0 ppid=3910 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.370000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:51:18.378000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.378000 audit[4056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff391dac8 a2=70 a3=0 items=0 ppid=3910 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:51:18.378000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:18.378000 audit[4056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff391d9a8 a2=70 a3=2 items=0 ppid=3910 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:51:18.392000 audit: BPF prog-id=153 op=UNLOAD Oct 2 18:51:18.567000 audit[4081]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=4081 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:18.567000 audit[4081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff81464b0 a2=0 a3=ffff7fd32fa0 items=0 ppid=3910 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:18.571000 audit[4082]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=4082 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:18.571000 audit[4082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffcc938490 a2=0 a3=ffff8172afa0 items=0 ppid=3910 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:18.580000 audit[4084]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4084 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:18.580000 audit[4084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffeb123970 a2=0 a3=ffff95641fa0 items=0 ppid=3910 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:18.590000 audit[4086]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4086 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:18.590000 audit[4086]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffcfa68180 a2=0 a3=ffff9bdc9fa0 items=0 ppid=3910 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:18.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:19.127488 (udev-worker)[4064]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:51:19.128609 systemd-networkd[1558]: vxlan.calico: Link UP Oct 2 18:51:19.128618 systemd-networkd[1558]: vxlan.calico: Gained carrier Oct 2 18:51:20.243127 systemd-networkd[1558]: vxlan.calico: Gained IPv6LL Oct 2 18:51:20.490442 env[1739]: time="2023-10-02T18:51:20.490373327Z" level=info msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" Oct 2 18:51:20.491146 env[1739]: time="2023-10-02T18:51:20.490346435Z" level=info msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" Oct 2 18:51:20.655443 kubelet[2866]: I1002 18:51:20.654640 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4jkxp" podStartSLOduration=7.8675427110000005 podCreationTimestamp="2023-10-02 18:50:54 +0000 UTC" firstStartedPulling="2023-10-02 18:50:56.224082396 +0000 UTC m=+23.254762532" lastFinishedPulling="2023-10-02 18:51:15.011113133 +0000 UTC m=+42.041793245" observedRunningTime="2023-10-02 18:51:15.778981935 +0000 UTC m=+42.809662083" watchObservedRunningTime="2023-10-02 18:51:20.654573424 +0000 UTC m=+47.685253536" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.658 [INFO][4133] k8s.go 576: Cleaning up netns ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.659 [INFO][4133] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" iface="eth0" netns="/var/run/netns/cni-b63853a4-3882-89a3-979f-17b5d4239374" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.660 [INFO][4133] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" iface="eth0" netns="/var/run/netns/cni-b63853a4-3882-89a3-979f-17b5d4239374" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.660 [INFO][4133] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" iface="eth0" netns="/var/run/netns/cni-b63853a4-3882-89a3-979f-17b5d4239374" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.661 [INFO][4133] k8s.go 583: Releasing IP address(es) ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.662 [INFO][4133] utils.go 196: Calico CNI releasing IP address ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.767 [INFO][4150] ipam_plugin.go 416: Releasing address using handleID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:20.802305 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:20.802305 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.793 [WARNING][4150] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.793 [INFO][4150] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:20.802305 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:20.802305 env[1739]: 2023-10-02 18:51:20.799 [INFO][4133] k8s.go 589: Teardown processing complete. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:20.805762 systemd[1]: run-netns-cni\x2db63853a4\x2d3882\x2d89a3\x2d979f\x2d17b5d4239374.mount: Deactivated successfully. Oct 2 18:51:20.808816 env[1739]: time="2023-10-02T18:51:20.808717506Z" level=info msg="TearDown network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" successfully" Oct 2 18:51:20.808816 env[1739]: time="2023-10-02T18:51:20.808798673Z" level=info msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" returns successfully" Oct 2 18:51:20.810121 env[1739]: time="2023-10-02T18:51:20.810017733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wgjbl,Uid:3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc,Namespace:kube-system,Attempt:1,}" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.688 [INFO][4134] k8s.go 576: Cleaning up netns ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.689 [INFO][4134] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" iface="eth0" netns="/var/run/netns/cni-c4981a4d-97b2-047f-d72a-77cc83b0d9c3" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.694 [INFO][4134] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" iface="eth0" netns="/var/run/netns/cni-c4981a4d-97b2-047f-d72a-77cc83b0d9c3" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.694 [INFO][4134] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" iface="eth0" netns="/var/run/netns/cni-c4981a4d-97b2-047f-d72a-77cc83b0d9c3" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.694 [INFO][4134] k8s.go 583: Releasing IP address(es) ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.694 [INFO][4134] utils.go 196: Calico CNI releasing IP address ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.811 [INFO][4155] ipam_plugin.go 416: Releasing address using handleID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:20.854539 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:20.854539 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.841 [WARNING][4155] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.841 [INFO][4155] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:20.854539 env[1739]: time="2023-10-02T18:51:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:20.854539 env[1739]: 2023-10-02 18:51:20.851 [INFO][4134] k8s.go 589: Teardown processing complete. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:20.862043 env[1739]: time="2023-10-02T18:51:20.858465768Z" level=info msg="TearDown network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" successfully" Oct 2 18:51:20.862043 env[1739]: time="2023-10-02T18:51:20.858528044Z" level=info msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" returns successfully" Oct 2 18:51:20.857823 systemd[1]: run-netns-cni\x2dc4981a4d\x2d97b2\x2d047f\x2dd72a\x2d77cc83b0d9c3.mount: Deactivated successfully. Oct 2 18:51:20.863328 env[1739]: time="2023-10-02T18:51:20.863243293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7c2m,Uid:8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6,Namespace:calico-system,Attempt:1,}" Oct 2 18:51:21.160185 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:51:21.160438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali08f5148be26: link becomes ready Oct 2 18:51:21.170584 systemd-networkd[1558]: cali08f5148be26: Link UP Oct 2 18:51:21.170604 systemd-networkd[1558]: cali08f5148be26: Gained carrier Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:20.968 [INFO][4166] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0 coredns-5dd5756b68- kube-system 3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc 702 0 2023-10-02 18:50:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-44 coredns-5dd5756b68-wgjbl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali08f5148be26 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:20.969 [INFO][4166] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.072 [INFO][4188] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" HandleID="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.095 [INFO][4188] ipam_plugin.go 269: Auto assigning IP ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" HandleID="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d860), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-44", "pod":"coredns-5dd5756b68-wgjbl", "timestamp":"2023-10-02 18:51:21.072064951 +0000 UTC"}, Hostname:"ip-172-31-21-44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:21.202636 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:21.202636 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.095 [INFO][4188] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-44' Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.099 [INFO][4188] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.107 [INFO][4188] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.118 [INFO][4188] ipam.go 489: Trying affinity for 192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.122 [INFO][4188] ipam.go 155: Attempting to load block cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.127 [INFO][4188] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.127 [INFO][4188] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.64/26 handle="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.133 [INFO][4188] ipam.go 1682: Creating new handle: k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8 Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.141 [INFO][4188] ipam.go 1203: Writing block in order to claim IPs block=192.168.75.64/26 handle="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.149 [INFO][4188] ipam.go 1216: Successfully claimed IPs: [192.168.75.65/26] block=192.168.75.64/26 handle="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.149 [INFO][4188] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.65/26] handle="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" host="ip-172-31-21-44" Oct 2 18:51:21.202636 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:21.202636 env[1739]: 2023-10-02 18:51:21.150 [INFO][4188] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.75.65/26] IPv6=[] ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" HandleID="k8s-pod-network.e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.152 [INFO][4166] k8s.go 383: Populated endpoint ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"", Pod:"coredns-5dd5756b68-wgjbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali08f5148be26", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.152 [INFO][4166] k8s.go 384: Calico CNI using IPs: [192.168.75.65/32] ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.153 [INFO][4166] dataplane_linux.go 68: Setting the host side veth name to cali08f5148be26 ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.162 [INFO][4166] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.172 [INFO][4166] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8", Pod:"coredns-5dd5756b68-wgjbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali08f5148be26", MAC:"72:61:b8:d6:63:11", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.203994 env[1739]: 2023-10-02 18:51:21.199 [INFO][4166] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8" Namespace="kube-system" Pod="coredns-5dd5756b68-wgjbl" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:21.277705 env[1739]: time="2023-10-02T18:51:21.275494495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:21.277705 env[1739]: time="2023-10-02T18:51:21.275578867Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:21.277705 env[1739]: time="2023-10-02T18:51:21.275605819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:21.277705 env[1739]: time="2023-10-02T18:51:21.276217844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8 pid=4219 runtime=io.containerd.runc.v2 Oct 2 18:51:21.302136 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali74763404732: link becomes ready Oct 2 18:51:21.317687 systemd-networkd[1558]: cali74763404732: Link UP Oct 2 18:51:21.317701 systemd-networkd[1558]: cali74763404732: Gained carrier Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.047 [INFO][4177] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0 csi-node-driver- calico-system 8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6 703 0 2023-10-02 18:51:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-21-44 csi-node-driver-m7c2m eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali74763404732 [] []}} ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.047 [INFO][4177] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.154 [INFO][4194] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" HandleID="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.215 [INFO][4194] ipam_plugin.go 269: Auto assigning IP ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" HandleID="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d600), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-44", "pod":"csi-node-driver-m7c2m", "timestamp":"2023-10-02 18:51:21.154514308 +0000 UTC"}, Hostname:"ip-172-31-21-44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:21.335277 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:21.335277 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.216 [INFO][4194] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-44' Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.220 [INFO][4194] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.229 [INFO][4194] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.253 [INFO][4194] ipam.go 489: Trying affinity for 192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.257 [INFO][4194] ipam.go 155: Attempting to load block cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.262 [INFO][4194] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.262 [INFO][4194] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.64/26 handle="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.265 [INFO][4194] ipam.go 1682: Creating new handle: k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116 Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.272 [INFO][4194] ipam.go 1203: Writing block in order to claim IPs block=192.168.75.64/26 handle="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.292 [INFO][4194] ipam.go 1216: Successfully claimed IPs: [192.168.75.66/26] block=192.168.75.64/26 handle="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.292 [INFO][4194] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.66/26] handle="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" host="ip-172-31-21-44" Oct 2 18:51:21.335277 env[1739]: time="2023-10-02T18:51:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:21.335277 env[1739]: 2023-10-02 18:51:21.292 [INFO][4194] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.75.66/26] IPv6=[] ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" HandleID="k8s-pod-network.aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.296 [INFO][4177] k8s.go 383: Populated endpoint ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"", Pod:"csi-node-driver-m7c2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74763404732", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.297 [INFO][4177] k8s.go 384: Calico CNI using IPs: [192.168.75.66/32] ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.297 [INFO][4177] dataplane_linux.go 68: Setting the host side veth name to cali74763404732 ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.302 [INFO][4177] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.307 [INFO][4177] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116", Pod:"csi-node-driver-m7c2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74763404732", MAC:"ba:f0:3c:3a:e3:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:21.336867 env[1739]: 2023-10-02 18:51:21.331 [INFO][4177] k8s.go 489: Wrote updated endpoint to datastore ContainerID="aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116" Namespace="calico-system" Pod="csi-node-driver-m7c2m" WorkloadEndpoint="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:21.373917 systemd[1]: Started cri-containerd-e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8.scope. Oct 2 18:51:21.382000 audit[4247]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:21.386903 kernel: kauditd_printk_skb: 129 callbacks suppressed Oct 2 18:51:21.387087 kernel: audit: type=1325 audit(1696272681.382:1182): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:21.382000 audit[4247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffe5d0d100 a2=0 a3=ffff99446fa0 items=0 ppid=3910 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.405726 kernel: audit: type=1300 audit(1696272681.382:1182): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffe5d0d100 a2=0 a3=ffff99446fa0 items=0 ppid=3910 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.382000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:21.420264 kernel: audit: type=1327 audit(1696272681.382:1182): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:21.438551 env[1739]: time="2023-10-02T18:51:21.437137679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:21.438551 env[1739]: time="2023-10-02T18:51:21.437231214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:21.438551 env[1739]: time="2023-10-02T18:51:21.437260086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:21.439645 env[1739]: time="2023-10-02T18:51:21.439486328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116 pid=4262 runtime=io.containerd.runc.v2 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.506954 kernel: audit: type=1400 audit(1696272681.488:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.507178 kernel: audit: type=1400 audit(1696272681.488:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.523122 kernel: audit: type=1400 audit(1696272681.488:1185): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.534172 kernel: audit: type=1400 audit(1696272681.488:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.534328 kernel: audit: type=1400 audit(1696272681.488:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.554380 systemd[1]: Started cri-containerd-aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116.scope. Oct 2 18:51:21.563295 kernel: audit: type=1400 audit(1696272681.488:1188): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.563436 kernel: audit: type=1400 audit(1696272681.488:1189): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.498000 audit: BPF prog-id=154 op=LOAD Oct 2 18:51:21.514000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.514000 audit[4229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4219 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326666366138323937626234663461613733326637616437336434 Oct 2 18:51:21.514000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.514000 audit[4229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4219 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326666366138323937626234663461613733326637616437336434 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit: BPF prog-id=155 op=LOAD Oct 2 18:51:21.524000 audit[4229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4219 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326666366138323937626234663461613733326637616437336434 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit: BPF prog-id=156 op=LOAD Oct 2 18:51:21.524000 audit[4229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4219 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326666366138323937626234663461613733326637616437336434 Oct 2 18:51:21.524000 audit: BPF prog-id=156 op=UNLOAD Oct 2 18:51:21.524000 audit: BPF prog-id=155 op=UNLOAD Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { perfmon } for pid=4229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit[4229]: AVC avc: denied { bpf } for pid=4229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.524000 audit: BPF prog-id=157 op=LOAD Oct 2 18:51:21.524000 audit[4229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4219 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326666366138323937626234663461613733326637616437336434 Oct 2 18:51:21.545000 audit[4293]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=4293 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:21.545000 audit[4293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffff51761d0 a2=0 a3=ffffbc0f5fa0 items=0 ppid=3910 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.599000 audit: BPF prog-id=158 op=LOAD Oct 2 18:51:21.601000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.601000 audit[4275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4262 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161623235303733353866633738343734383735316336303838376433 Oct 2 18:51:21.601000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.601000 audit[4275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4262 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161623235303733353866633738343734383735316336303838376433 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.602000 audit: BPF prog-id=159 op=LOAD Oct 2 18:51:21.602000 audit[4275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4262 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161623235303733353866633738343734383735316336303838376433 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.604000 audit: BPF prog-id=160 op=LOAD Oct 2 18:51:21.604000 audit[4275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4262 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161623235303733353866633738343734383735316336303838376433 Oct 2 18:51:21.606000 audit: BPF prog-id=160 op=UNLOAD Oct 2 18:51:21.606000 audit: BPF prog-id=159 op=UNLOAD Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { perfmon } for pid=4275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit[4275]: AVC avc: denied { bpf } for pid=4275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.606000 audit: BPF prog-id=161 op=LOAD Oct 2 18:51:21.606000 audit[4275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4262 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161623235303733353866633738343734383735316336303838376433 Oct 2 18:51:21.629242 env[1739]: time="2023-10-02T18:51:21.629170231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wgjbl,Uid:3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc,Namespace:kube-system,Attempt:1,} returns sandbox id \"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8\"" Oct 2 18:51:21.638987 env[1739]: time="2023-10-02T18:51:21.638924290Z" level=info msg="CreateContainer within sandbox \"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:51:21.654362 env[1739]: time="2023-10-02T18:51:21.654305596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7c2m,Uid:8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6,Namespace:calico-system,Attempt:1,} returns sandbox id \"aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116\"" Oct 2 18:51:21.659357 env[1739]: time="2023-10-02T18:51:21.659262847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:51:21.667714 env[1739]: time="2023-10-02T18:51:21.667614794Z" level=info msg="CreateContainer within sandbox \"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2f30a5d935c71ea1639e2cea4ba8fcd92145b34808b3e03d8b776a3ef0c2fdab\"" Oct 2 18:51:21.671515 env[1739]: time="2023-10-02T18:51:21.671331490Z" level=info msg="StartContainer for \"2f30a5d935c71ea1639e2cea4ba8fcd92145b34808b3e03d8b776a3ef0c2fdab\"" Oct 2 18:51:21.719323 systemd[1]: Started cri-containerd-2f30a5d935c71ea1639e2cea4ba8fcd92145b34808b3e03d8b776a3ef0c2fdab.scope. Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.767000 audit: BPF prog-id=162 op=LOAD Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4219 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333061356439333563373165613136333965326365613462613866 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4219 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333061356439333563373165613136333965326365613462613866 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.768000 audit: BPF prog-id=163 op=LOAD Oct 2 18:51:21.768000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4219 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333061356439333563373165613136333965326365613462613866 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit: BPF prog-id=164 op=LOAD Oct 2 18:51:21.769000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4219 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333061356439333563373165613136333965326365613462613866 Oct 2 18:51:21.769000 audit: BPF prog-id=164 op=UNLOAD Oct 2 18:51:21.769000 audit: BPF prog-id=163 op=UNLOAD Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:21.769000 audit: BPF prog-id=165 op=LOAD Oct 2 18:51:21.769000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4219 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:21.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333061356439333563373165613136333965326365613462613866 Oct 2 18:51:21.832299 env[1739]: time="2023-10-02T18:51:21.832216084Z" level=info msg="StartContainer for \"2f30a5d935c71ea1639e2cea4ba8fcd92145b34808b3e03d8b776a3ef0c2fdab\" returns successfully" Oct 2 18:51:21.846739 env[1739]: time="2023-10-02T18:51:21.846664936Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:21.848302 env[1739]: time="2023-10-02T18:51:21.848203250Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:21.848823 kubelet[2866]: E1002 18:51:21.848789 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:21.849549 kubelet[2866]: E1002 18:51:21.849516 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:21.850460 kubelet[2866]: E1002 18:51:21.850397 2866 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:21.852000 env[1739]: time="2023-10-02T18:51:21.851949634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:51:22.043258 env[1739]: time="2023-10-02T18:51:22.043103946Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:22.044521 env[1739]: time="2023-10-02T18:51:22.044412464Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:22.045224 kubelet[2866]: E1002 18:51:22.045173 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:22.045517 kubelet[2866]: E1002 18:51:22.045486 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:22.046602 kubelet[2866]: E1002 18:51:22.046534 2866 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:22.047276 kubelet[2866]: E1002 18:51:22.047055 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:22.491179 env[1739]: time="2023-10-02T18:51:22.491008564Z" level=info msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" Oct 2 18:51:22.491438 env[1739]: time="2023-10-02T18:51:22.491008924Z" level=info msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.639 [INFO][4374] k8s.go 576: Cleaning up netns ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.639 [INFO][4374] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" iface="eth0" netns="/var/run/netns/cni-aab50eae-a333-2098-c609-eee3175f859b" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.640 [INFO][4374] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" iface="eth0" netns="/var/run/netns/cni-aab50eae-a333-2098-c609-eee3175f859b" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.641 [INFO][4374] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" iface="eth0" netns="/var/run/netns/cni-aab50eae-a333-2098-c609-eee3175f859b" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.642 [INFO][4374] k8s.go 583: Releasing IP address(es) ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.642 [INFO][4374] utils.go 196: Calico CNI releasing IP address ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.747 [INFO][4394] ipam_plugin.go 416: Releasing address using handleID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:22.782932 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:22.782932 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.772 [WARNING][4394] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.772 [INFO][4394] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:22.782932 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:22.782932 env[1739]: 2023-10-02 18:51:22.780 [INFO][4374] k8s.go 589: Teardown processing complete. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:22.789227 env[1739]: time="2023-10-02T18:51:22.789031529Z" level=info msg="TearDown network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" successfully" Oct 2 18:51:22.789526 env[1739]: time="2023-10-02T18:51:22.789474123Z" level=info msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" returns successfully" Oct 2 18:51:22.792249 systemd[1]: run-netns-cni\x2daab50eae\x2da333\x2d2098\x2dc609\x2deee3175f859b.mount: Deactivated successfully. Oct 2 18:51:22.795988 env[1739]: time="2023-10-02T18:51:22.795926135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-k72xn,Uid:133bdbd8-1ee8-4bbd-a7a3-6228eefcb813,Namespace:kube-system,Attempt:1,}" Oct 2 18:51:22.802382 systemd-networkd[1558]: cali08f5148be26: Gained IPv6LL Oct 2 18:51:22.813299 kubelet[2866]: E1002 18:51:22.813238 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.675 [INFO][4384] k8s.go 576: Cleaning up netns ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.676 [INFO][4384] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" iface="eth0" netns="/var/run/netns/cni-8d0d70f2-5a17-9633-49e0-48a10e81f54a" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.676 [INFO][4384] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" iface="eth0" netns="/var/run/netns/cni-8d0d70f2-5a17-9633-49e0-48a10e81f54a" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.677 [INFO][4384] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" iface="eth0" netns="/var/run/netns/cni-8d0d70f2-5a17-9633-49e0-48a10e81f54a" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.677 [INFO][4384] k8s.go 583: Releasing IP address(es) ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.677 [INFO][4384] utils.go 196: Calico CNI releasing IP address ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.806 [INFO][4401] ipam_plugin.go 416: Releasing address using handleID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:22.909489 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:22.909489 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.868 [WARNING][4401] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.868 [INFO][4401] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:22.909489 env[1739]: time="2023-10-02T18:51:22Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:22.909489 env[1739]: 2023-10-02 18:51:22.907 [INFO][4384] k8s.go 589: Teardown processing complete. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:22.912852 systemd[1]: run-netns-cni\x2d8d0d70f2\x2d5a17\x2d9633\x2d49e0\x2d48a10e81f54a.mount: Deactivated successfully. Oct 2 18:51:22.917691 env[1739]: time="2023-10-02T18:51:22.917552626Z" level=info msg="TearDown network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" successfully" Oct 2 18:51:22.917691 env[1739]: time="2023-10-02T18:51:22.917629754Z" level=info msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" returns successfully" Oct 2 18:51:22.918955 env[1739]: time="2023-10-02T18:51:22.918845466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-524h6,Uid:eaa778dd-c0ca-40d3-87cc-9e89e186ed0a,Namespace:calico-system,Attempt:1,}" Oct 2 18:51:22.935023 kubelet[2866]: I1002 18:51:22.933485 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-wgjbl" podStartSLOduration=35.933394445 podCreationTimestamp="2023-10-02 18:50:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:51:22.874054919 +0000 UTC m=+49.904735127" watchObservedRunningTime="2023-10-02 18:51:22.933394445 +0000 UTC m=+49.964074617" Oct 2 18:51:22.994447 systemd-networkd[1558]: cali74763404732: Gained IPv6LL Oct 2 18:51:23.035000 audit[4433]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=4433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:23.035000 audit[4433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd670c040 a2=0 a3=ffffa298a6c0 items=0 ppid=3027 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:23.039000 audit[4433]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:23.039000 audit[4433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffd670c040 a2=0 a3=ffffa298a6c0 items=0 ppid=3027 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:23.066000 audit[4436]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:23.066000 audit[4436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd6c55570 a2=0 a3=ffff96b586c0 items=0 ppid=3027 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:23.078000 audit[4436]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:23.078000 audit[4436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd6c55570 a2=0 a3=ffff96b586c0 items=0 ppid=3027 pid=4436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:23.281496 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:51:23.281625 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26d49725d2a: link becomes ready Oct 2 18:51:23.297984 systemd-networkd[1558]: cali26d49725d2a: Link UP Oct 2 18:51:23.297999 systemd-networkd[1558]: cali26d49725d2a: Gained carrier Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.074 [INFO][4412] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0 coredns-5dd5756b68- kube-system 133bdbd8-1ee8-4bbd-a7a3-6228eefcb813 725 0 2023-10-02 18:50:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-44 coredns-5dd5756b68-k72xn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali26d49725d2a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.075 [INFO][4412] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.190 [INFO][4438] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" HandleID="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.211 [INFO][4438] ipam_plugin.go 269: Auto assigning IP ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" HandleID="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001043e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-44", "pod":"coredns-5dd5756b68-k72xn", "timestamp":"2023-10-02 18:51:23.19000173 +0000 UTC"}, Hostname:"ip-172-31-21-44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:23.346634 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:23.346634 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.211 [INFO][4438] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-44' Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.215 [INFO][4438] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.223 [INFO][4438] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.231 [INFO][4438] ipam.go 489: Trying affinity for 192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.235 [INFO][4438] ipam.go 155: Attempting to load block cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.239 [INFO][4438] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.239 [INFO][4438] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.64/26 handle="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.246 [INFO][4438] ipam.go 1682: Creating new handle: k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87 Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.253 [INFO][4438] ipam.go 1203: Writing block in order to claim IPs block=192.168.75.64/26 handle="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.268 [INFO][4438] ipam.go 1216: Successfully claimed IPs: [192.168.75.67/26] block=192.168.75.64/26 handle="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.268 [INFO][4438] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.67/26] handle="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" host="ip-172-31-21-44" Oct 2 18:51:23.346634 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:23.346634 env[1739]: 2023-10-02 18:51:23.268 [INFO][4438] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.75.67/26] IPv6=[] ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" HandleID="k8s-pod-network.4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.273 [INFO][4412] k8s.go 383: Populated endpoint ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"", Pod:"coredns-5dd5756b68-k72xn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d49725d2a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.273 [INFO][4412] k8s.go 384: Calico CNI using IPs: [192.168.75.67/32] ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.273 [INFO][4412] dataplane_linux.go 68: Setting the host side veth name to cali26d49725d2a ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.282 [INFO][4412] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.297 [INFO][4412] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87", Pod:"coredns-5dd5756b68-k72xn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d49725d2a", MAC:"b2:63:a4:78:ac:fb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:23.349499 env[1739]: 2023-10-02 18:51:23.335 [INFO][4412] k8s.go 489: Wrote updated endpoint to datastore ContainerID="4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87" Namespace="kube-system" Pod="coredns-5dd5756b68-k72xn" WorkloadEndpoint="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:23.445142 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicac67bec16d: link becomes ready Oct 2 18:51:23.460345 systemd-networkd[1558]: calicac67bec16d: Link UP Oct 2 18:51:23.460359 systemd-networkd[1558]: calicac67bec16d: Gained carrier Oct 2 18:51:23.476000 audit[4469]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=4469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:23.476000 audit[4469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=ffffda9e9380 a2=0 a3=ffffbc057fa0 items=0 ppid=3910 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.476000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.150 [INFO][4424] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0 calico-kube-controllers-74b9887bb6- calico-system eaa778dd-c0ca-40d3-87cc-9e89e186ed0a 726 0 2023-10-02 18:50:54 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-21-44 calico-kube-controllers-74b9887bb6-524h6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicac67bec16d [] []}} ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.150 [INFO][4424] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.284 [INFO][4444] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" HandleID="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.346 [INFO][4444] ipam_plugin.go 269: Auto assigning IP ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" HandleID="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000529570), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-44", "pod":"calico-kube-controllers-74b9887bb6-524h6", "timestamp":"2023-10-02 18:51:23.284437598 +0000 UTC"}, Hostname:"ip-172-31-21-44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:51:23.517148 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:23.517148 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.347 [INFO][4444] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-44' Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.354 [INFO][4444] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.372 [INFO][4444] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.386 [INFO][4444] ipam.go 489: Trying affinity for 192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.390 [INFO][4444] ipam.go 155: Attempting to load block cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.398 [INFO][4444] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.398 [INFO][4444] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.64/26 handle="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.404 [INFO][4444] ipam.go 1682: Creating new handle: k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113 Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.414 [INFO][4444] ipam.go 1203: Writing block in order to claim IPs block=192.168.75.64/26 handle="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.431 [INFO][4444] ipam.go 1216: Successfully claimed IPs: [192.168.75.68/26] block=192.168.75.64/26 handle="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.432 [INFO][4444] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.68/26] handle="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" host="ip-172-31-21-44" Oct 2 18:51:23.517148 env[1739]: time="2023-10-02T18:51:23Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:23.517148 env[1739]: 2023-10-02 18:51:23.432 [INFO][4444] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.75.68/26] IPv6=[] ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" HandleID="k8s-pod-network.134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.435 [INFO][4424] k8s.go 383: Populated endpoint ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-524h6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicac67bec16d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.435 [INFO][4424] k8s.go 384: Calico CNI using IPs: [192.168.75.68/32] ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.435 [INFO][4424] dataplane_linux.go 68: Setting the host side veth name to calicac67bec16d ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.444 [INFO][4424] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.464 [INFO][4424] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113", Pod:"calico-kube-controllers-74b9887bb6-524h6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicac67bec16d", MAC:"7e:7d:f5:ae:c9:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:23.542901 env[1739]: 2023-10-02 18:51:23.508 [INFO][4424] k8s.go 489: Wrote updated endpoint to datastore ContainerID="134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-524h6" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:23.611155 env[1739]: time="2023-10-02T18:51:23.598675064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:23.611155 env[1739]: time="2023-10-02T18:51:23.598750034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:23.611155 env[1739]: time="2023-10-02T18:51:23.598776076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:23.611155 env[1739]: time="2023-10-02T18:51:23.600376438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87 pid=4488 runtime=io.containerd.runc.v2 Oct 2 18:51:23.632368 env[1739]: time="2023-10-02T18:51:23.631483663Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:51:23.632368 env[1739]: time="2023-10-02T18:51:23.631670057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:51:23.632368 env[1739]: time="2023-10-02T18:51:23.631757431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:51:23.636237 env[1739]: time="2023-10-02T18:51:23.636054956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113 pid=4498 runtime=io.containerd.runc.v2 Oct 2 18:51:23.668000 audit[4518]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:51:23.668000 audit[4518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffe8640a50 a2=0 a3=ffffba4defa0 items=0 ppid=3910 pid=4518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.668000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:51:23.692123 systemd[1]: Started cri-containerd-4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87.scope. Oct 2 18:51:23.721556 systemd[1]: Started cri-containerd-134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113.scope. Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.769000 audit: BPF prog-id=166 op=LOAD Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4488 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462323664636235363165376536373931343632356239356430376631 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4488 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462323664636235363165376536373931343632356239356430376631 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit: BPF prog-id=167 op=LOAD Oct 2 18:51:23.770000 audit[4501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4488 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462323664636235363165376536373931343632356239356430376631 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit: BPF prog-id=168 op=LOAD Oct 2 18:51:23.770000 audit[4501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4488 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462323664636235363165376536373931343632356239356430376631 Oct 2 18:51:23.770000 audit: BPF prog-id=168 op=UNLOAD Oct 2 18:51:23.770000 audit: BPF prog-id=167 op=UNLOAD Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { perfmon } for pid=4501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit[4501]: AVC avc: denied { bpf } for pid=4501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.770000 audit: BPF prog-id=169 op=LOAD Oct 2 18:51:23.770000 audit[4501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4488 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462323664636235363165376536373931343632356239356430376631 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.787000 audit: BPF prog-id=170 op=LOAD Oct 2 18:51:23.789000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.789000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4498 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343135316363353837396430636136623662396435626466643538 Oct 2 18:51:23.789000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.789000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4498 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343135316363353837396430636136623662396435626466643538 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.790000 audit: BPF prog-id=171 op=LOAD Oct 2 18:51:23.790000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4498 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343135316363353837396430636136623662396435626466643538 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.791000 audit: BPF prog-id=172 op=LOAD Oct 2 18:51:23.791000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4498 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343135316363353837396430636136623662396435626466643538 Oct 2 18:51:23.793000 audit: BPF prog-id=172 op=UNLOAD Oct 2 18:51:23.793000 audit: BPF prog-id=171 op=UNLOAD Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:23.793000 audit: BPF prog-id=173 op=LOAD Oct 2 18:51:23.793000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4498 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:23.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343135316363353837396430636136623662396435626466643538 Oct 2 18:51:23.909875 env[1739]: time="2023-10-02T18:51:23.902698418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-k72xn,Uid:133bdbd8-1ee8-4bbd-a7a3-6228eefcb813,Namespace:kube-system,Attempt:1,} returns sandbox id \"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87\"" Oct 2 18:51:23.914972 env[1739]: time="2023-10-02T18:51:23.914876781Z" level=info msg="CreateContainer within sandbox \"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:51:23.957982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount231578548.mount: Deactivated successfully. Oct 2 18:51:23.970121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193487964.mount: Deactivated successfully. Oct 2 18:51:23.976474 env[1739]: time="2023-10-02T18:51:23.976405028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-524h6,Uid:eaa778dd-c0ca-40d3-87cc-9e89e186ed0a,Namespace:calico-system,Attempt:1,} returns sandbox id \"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113\"" Oct 2 18:51:23.980761 env[1739]: time="2023-10-02T18:51:23.979694170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 18:51:23.983764 env[1739]: time="2023-10-02T18:51:23.983500835Z" level=info msg="CreateContainer within sandbox \"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"69bb4addacc592a869291b8cf03665be45cca6afb5f8287c31857be45841a3f7\"" Oct 2 18:51:23.987125 env[1739]: time="2023-10-02T18:51:23.985056623Z" level=info msg="StartContainer for \"69bb4addacc592a869291b8cf03665be45cca6afb5f8287c31857be45841a3f7\"" Oct 2 18:51:24.042302 systemd[1]: Started cri-containerd-69bb4addacc592a869291b8cf03665be45cca6afb5f8287c31857be45841a3f7.scope. Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.092000 audit: BPF prog-id=174 op=LOAD Oct 2 18:51:24.094000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.094000 audit[4569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4488 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639626234616464616363353932613836393239316238636630333636 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4488 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639626234616464616363353932613836393239316238636630333636 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.095000 audit: BPF prog-id=175 op=LOAD Oct 2 18:51:24.095000 audit[4569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4488 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639626234616464616363353932613836393239316238636630333636 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.097000 audit: BPF prog-id=176 op=LOAD Oct 2 18:51:24.097000 audit[4569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4488 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639626234616464616363353932613836393239316238636630333636 Oct 2 18:51:24.099000 audit: BPF prog-id=176 op=UNLOAD Oct 2 18:51:24.099000 audit: BPF prog-id=175 op=UNLOAD Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { perfmon } for pid=4569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit[4569]: AVC avc: denied { bpf } for pid=4569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:24.099000 audit: BPF prog-id=177 op=LOAD Oct 2 18:51:24.099000 audit[4569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4488 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639626234616464616363353932613836393239316238636630333636 Oct 2 18:51:24.139378 env[1739]: time="2023-10-02T18:51:24.139272587Z" level=info msg="StartContainer for \"69bb4addacc592a869291b8cf03665be45cca6afb5f8287c31857be45841a3f7\" returns successfully" Oct 2 18:51:24.874021 kubelet[2866]: I1002 18:51:24.873918 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-k72xn" podStartSLOduration=37.873853212 podCreationTimestamp="2023-10-02 18:50:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 18:51:24.846715806 +0000 UTC m=+51.877395906" watchObservedRunningTime="2023-10-02 18:51:24.873853212 +0000 UTC m=+51.904533360" Oct 2 18:51:24.904000 audit[4601]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:24.904000 audit[4601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd03b2af0 a2=0 a3=ffff9d3496c0 items=0 ppid=3027 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:24.909000 audit[4601]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:24.909000 audit[4601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd03b2af0 a2=0 a3=ffff9d3496c0 items=0 ppid=3027 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:24.914900 systemd-networkd[1558]: cali26d49725d2a: Gained IPv6LL Oct 2 18:51:24.970000 audit[4603]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:24.970000 audit[4603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd0498ae0 a2=0 a3=ffff879336c0 items=0 ppid=3027 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:24.987000 audit[4603]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:51:24.987000 audit[4603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffd0498ae0 a2=0 a3=ffff879336c0 items=0 ppid=3027 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:24.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:51:25.236236 systemd-networkd[1558]: calicac67bec16d: Gained IPv6LL Oct 2 18:51:26.590460 env[1739]: time="2023-10-02T18:51:26.590372529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:26.595239 env[1739]: time="2023-10-02T18:51:26.595172432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:26.600332 env[1739]: time="2023-10-02T18:51:26.600271392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:26.605034 env[1739]: time="2023-10-02T18:51:26.604973480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:51:26.608202 env[1739]: time="2023-10-02T18:51:26.606772156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 18:51:26.612141 env[1739]: time="2023-10-02T18:51:26.612033876Z" level=info msg="CreateContainer within sandbox \"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 18:51:26.644170 env[1739]: time="2023-10-02T18:51:26.643446129Z" level=info msg="CreateContainer within sandbox \"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b\"" Oct 2 18:51:26.644235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1363904636.mount: Deactivated successfully. Oct 2 18:51:26.647090 env[1739]: time="2023-10-02T18:51:26.646974396Z" level=info msg="StartContainer for \"ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b\"" Oct 2 18:51:26.720839 systemd[1]: Started cri-containerd-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b.scope. Oct 2 18:51:26.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.796894 kernel: kauditd_printk_skb: 368 callbacks suppressed Oct 2 18:51:26.796997 kernel: audit: type=1400 audit(1696272686.793:1302): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811615 kernel: audit: type=1400 audit(1696272686.801:1303): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.820850 kernel: audit: type=1400 audit(1696272686.801:1304): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.829399 kernel: audit: type=1400 audit(1696272686.801:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.839897 kernel: audit: type=1400 audit(1696272686.801:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.849339 kernel: audit: type=1400 audit(1696272686.801:1307): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.859621 kernel: audit: type=1400 audit(1696272686.801:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.868435 kernel: audit: type=1400 audit(1696272686.801:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.868585 kernel: audit: type=1400 audit(1696272686.801:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.883721 kernel: audit: type=1400 audit(1696272686.803:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.803000 audit: BPF prog-id=178 op=LOAD Oct 2 18:51:26.810000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.810000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4498 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:26.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343334383863666362373239393639626539333165376338343966 Oct 2 18:51:26.810000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.810000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4498 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:26.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343334383863666362373239393639626539333165376338343966 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit: BPF prog-id=179 op=LOAD Oct 2 18:51:26.811000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4498 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:26.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343334383863666362373239393639626539333165376338343966 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit: BPF prog-id=180 op=LOAD Oct 2 18:51:26.811000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4498 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:26.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343334383863666362373239393639626539333165376338343966 Oct 2 18:51:26.811000 audit: BPF prog-id=180 op=UNLOAD Oct 2 18:51:26.811000 audit: BPF prog-id=179 op=UNLOAD Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:51:26.811000 audit: BPF prog-id=181 op=LOAD Oct 2 18:51:26.811000 audit[4634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4498 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:26.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343334383863666362373239393639626539333165376338343966 Oct 2 18:51:26.894251 env[1739]: time="2023-10-02T18:51:26.894172779Z" level=info msg="StartContainer for \"ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b\" returns successfully" Oct 2 18:51:27.082283 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.kliHAt.mount: Deactivated successfully. Oct 2 18:51:27.904721 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.BgJrlQ.mount: Deactivated successfully. Oct 2 18:51:27.996811 kubelet[2866]: I1002 18:51:27.996767 2866 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-524h6" podStartSLOduration=31.366279311 podCreationTimestamp="2023-10-02 18:50:54 +0000 UTC" firstStartedPulling="2023-10-02 18:51:23.978696834 +0000 UTC m=+51.009376934" lastFinishedPulling="2023-10-02 18:51:26.609123014 +0000 UTC m=+53.639803114" observedRunningTime="2023-10-02 18:51:27.86856929 +0000 UTC m=+54.899249438" watchObservedRunningTime="2023-10-02 18:51:27.996705491 +0000 UTC m=+55.027385615" Oct 2 18:51:28.980000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:28.980000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4003e0cb70 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:28.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:28.980000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:28.980000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006261b60 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:28.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:28.980000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:28.980000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4004643050 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:28.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:29.096000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:29.096000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40045dc630 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:29.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:29.110000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:29.110000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:29.110000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40043256e0 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:29.110000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:29.110000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40045dc6c0 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:51:29.110000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:51:29.342000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:29.342000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40008933b0 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:29.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:29.344000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:29.344000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001512680 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:29.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:29.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.44:22-139.178.89.65:42342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:29.797171 systemd[1]: Started sshd@7-172.31.21.44:22-139.178.89.65:42342.service. Oct 2 18:51:29.979000 audit[4694]: USER_ACCT pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:29.980689 sshd[4694]: Accepted publickey for core from 139.178.89.65 port 42342 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:29.982000 audit[4694]: CRED_ACQ pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:29.982000 audit[4694]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa1d6ac0 a2=3 a3=1 items=0 ppid=1 pid=4694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:29.982000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:29.984955 sshd[4694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:29.996877 systemd-logind[1735]: New session 8 of user core. Oct 2 18:51:29.998131 systemd[1]: Started session-8.scope. Oct 2 18:51:30.010000 audit[4694]: USER_START pid=4694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:30.017000 audit[4696]: CRED_ACQ pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:30.310446 sshd[4694]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:30.311000 audit[4694]: USER_END pid=4694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:30.312000 audit[4694]: CRED_DISP pid=4694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:30.316819 systemd-logind[1735]: Session 8 logged out. Waiting for processes to exit. Oct 2 18:51:30.316823 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 18:51:30.318881 systemd[1]: sshd@7-172.31.21.44:22-139.178.89.65:42342.service: Deactivated successfully. Oct 2 18:51:30.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.44:22-139.178.89.65:42342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:30.321009 systemd-logind[1735]: Removed session 8. Oct 2 18:51:33.357845 env[1739]: time="2023-10-02T18:51:33.357794306Z" level=info msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.456 [WARNING][4719] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116", Pod:"csi-node-driver-m7c2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74763404732", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.457 [INFO][4719] k8s.go 576: Cleaning up netns ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.457 [INFO][4719] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" iface="eth0" netns="" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.457 [INFO][4719] k8s.go 583: Releasing IP address(es) ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.457 [INFO][4719] utils.go 196: Calico CNI releasing IP address ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.517 [INFO][4725] ipam_plugin.go 416: Releasing address using handleID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.546631 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:33.546631 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.539 [WARNING][4725] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.539 [INFO][4725] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.546631 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:33.546631 env[1739]: 2023-10-02 18:51:33.544 [INFO][4719] k8s.go 589: Teardown processing complete. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.547728 env[1739]: time="2023-10-02T18:51:33.547676917Z" level=info msg="TearDown network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" successfully" Oct 2 18:51:33.547879 env[1739]: time="2023-10-02T18:51:33.547841949Z" level=info msg="StopPodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" returns successfully" Oct 2 18:51:33.548809 env[1739]: time="2023-10-02T18:51:33.548751857Z" level=info msg="RemovePodSandbox for \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" Oct 2 18:51:33.549148 env[1739]: time="2023-10-02T18:51:33.548989376Z" level=info msg="Forcibly stopping sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\"" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.670 [WARNING][4745] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"aab2507358fc784748751c60887d3542062977db49cf39979ef5f21e4e876116", Pod:"csi-node-driver-m7c2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali74763404732", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.671 [INFO][4745] k8s.go 576: Cleaning up netns ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.671 [INFO][4745] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" iface="eth0" netns="" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.672 [INFO][4745] k8s.go 583: Releasing IP address(es) ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.672 [INFO][4745] utils.go 196: Calico CNI releasing IP address ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.728 [INFO][4751] ipam_plugin.go 416: Releasing address using handleID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.752490 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:33.752490 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.743 [WARNING][4751] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.743 [INFO][4751] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" HandleID="k8s-pod-network.f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Workload="ip--172--31--21--44-k8s-csi--node--driver--m7c2m-eth0" Oct 2 18:51:33.752490 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:33.752490 env[1739]: 2023-10-02 18:51:33.748 [INFO][4745] k8s.go 589: Teardown processing complete. ContainerID="f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6" Oct 2 18:51:33.753532 env[1739]: time="2023-10-02T18:51:33.753212089Z" level=info msg="TearDown network for sandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" successfully" Oct 2 18:51:33.763234 env[1739]: time="2023-10-02T18:51:33.763162679Z" level=info msg="RemovePodSandbox \"f4a045e0e33a9e4a4f2f6f280c05045ca5eb531c6d53f4bc90a153d4d442f8a6\" returns successfully" Oct 2 18:51:33.764120 env[1739]: time="2023-10-02T18:51:33.764047573Z" level=info msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.862 [WARNING][4769] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87", Pod:"coredns-5dd5756b68-k72xn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d49725d2a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.863 [INFO][4769] k8s.go 576: Cleaning up netns ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.863 [INFO][4769] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" iface="eth0" netns="" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.863 [INFO][4769] k8s.go 583: Releasing IP address(es) ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.863 [INFO][4769] utils.go 196: Calico CNI releasing IP address ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.920 [INFO][4775] ipam_plugin.go 416: Releasing address using handleID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:33.945157 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:33.945157 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.935 [WARNING][4775] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.936 [INFO][4775] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:33.945157 env[1739]: time="2023-10-02T18:51:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:33.945157 env[1739]: 2023-10-02 18:51:33.943 [INFO][4769] k8s.go 589: Teardown processing complete. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:33.946171 env[1739]: time="2023-10-02T18:51:33.945206263Z" level=info msg="TearDown network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" successfully" Oct 2 18:51:33.946171 env[1739]: time="2023-10-02T18:51:33.945252764Z" level=info msg="StopPodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" returns successfully" Oct 2 18:51:33.946838 env[1739]: time="2023-10-02T18:51:33.946788849Z" level=info msg="RemovePodSandbox for \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" Oct 2 18:51:33.947129 env[1739]: time="2023-10-02T18:51:33.947027819Z" level=info msg="Forcibly stopping sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\"" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.091 [WARNING][4797] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"133bdbd8-1ee8-4bbd-a7a3-6228eefcb813", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"4b26dcb561e7e67914625b95d07f1a15574b31ac071b9a34493dea961f602d87", Pod:"coredns-5dd5756b68-k72xn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d49725d2a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.092 [INFO][4797] k8s.go 576: Cleaning up netns ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.092 [INFO][4797] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" iface="eth0" netns="" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.092 [INFO][4797] k8s.go 583: Releasing IP address(es) ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.092 [INFO][4797] utils.go 196: Calico CNI releasing IP address ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.151 [INFO][4803] ipam_plugin.go 416: Releasing address using handleID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:34.173019 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:34.173019 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.166 [WARNING][4803] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.166 [INFO][4803] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" HandleID="k8s-pod-network.4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--k72xn-eth0" Oct 2 18:51:34.173019 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:34.173019 env[1739]: 2023-10-02 18:51:34.170 [INFO][4797] k8s.go 589: Teardown processing complete. ContainerID="4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2" Oct 2 18:51:34.173019 env[1739]: time="2023-10-02T18:51:34.173095427Z" level=info msg="TearDown network for sandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" successfully" Oct 2 18:51:34.178262 env[1739]: time="2023-10-02T18:51:34.178184148Z" level=info msg="RemovePodSandbox \"4d5358ce97e80cebbed9c1667722bf2bae0ed98aec6500d010e4d67fc885a8c2\" returns successfully" Oct 2 18:51:34.179174 env[1739]: time="2023-10-02T18:51:34.179123161Z" level=info msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.283 [WARNING][4822] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8", Pod:"coredns-5dd5756b68-wgjbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali08f5148be26", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.284 [INFO][4822] k8s.go 576: Cleaning up netns ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.284 [INFO][4822] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" iface="eth0" netns="" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.284 [INFO][4822] k8s.go 583: Releasing IP address(es) ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.284 [INFO][4822] utils.go 196: Calico CNI releasing IP address ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.341 [INFO][4828] ipam_plugin.go 416: Releasing address using handleID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.365362 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:34.365362 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.357 [WARNING][4828] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.357 [INFO][4828] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.365362 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:34.365362 env[1739]: 2023-10-02 18:51:34.362 [INFO][4822] k8s.go 589: Teardown processing complete. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.369261 env[1739]: time="2023-10-02T18:51:34.369202975Z" level=info msg="TearDown network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" successfully" Oct 2 18:51:34.369451 env[1739]: time="2023-10-02T18:51:34.369415902Z" level=info msg="StopPodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" returns successfully" Oct 2 18:51:34.370368 env[1739]: time="2023-10-02T18:51:34.370308546Z" level=info msg="RemovePodSandbox for \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" Oct 2 18:51:34.370505 env[1739]: time="2023-10-02T18:51:34.370369120Z" level=info msg="Forcibly stopping sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\"" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.474 [WARNING][4847] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3ac7c3cc-77d6-4e74-8e6d-6d885fbc5dfc", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"e52ff6a8297bb4f4aa732f7ad73d450a3f4c2f279ff20a559952eaa986a9d1e8", Pod:"coredns-5dd5756b68-wgjbl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali08f5148be26", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.475 [INFO][4847] k8s.go 576: Cleaning up netns ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.475 [INFO][4847] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" iface="eth0" netns="" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.476 [INFO][4847] k8s.go 583: Releasing IP address(es) ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.476 [INFO][4847] utils.go 196: Calico CNI releasing IP address ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.535 [INFO][4853] ipam_plugin.go 416: Releasing address using handleID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.568910 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:34.568910 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.561 [WARNING][4853] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.561 [INFO][4853] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" HandleID="k8s-pod-network.0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Workload="ip--172--31--21--44-k8s-coredns--5dd5756b68--wgjbl-eth0" Oct 2 18:51:34.568910 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:34.568910 env[1739]: 2023-10-02 18:51:34.566 [INFO][4847] k8s.go 589: Teardown processing complete. ContainerID="0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae" Oct 2 18:51:34.570193 env[1739]: time="2023-10-02T18:51:34.570137307Z" level=info msg="TearDown network for sandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" successfully" Oct 2 18:51:34.575322 env[1739]: time="2023-10-02T18:51:34.575253585Z" level=info msg="RemovePodSandbox \"0b46e39825cc9416b485d06e2ac2c5a1aa70d0e84510062bbfa5d0dfb55310ae\" returns successfully" Oct 2 18:51:34.576457 env[1739]: time="2023-10-02T18:51:34.576388489Z" level=info msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.692 [WARNING][4873] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113", Pod:"calico-kube-controllers-74b9887bb6-524h6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicac67bec16d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.694 [INFO][4873] k8s.go 576: Cleaning up netns ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.694 [INFO][4873] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" iface="eth0" netns="" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.694 [INFO][4873] k8s.go 583: Releasing IP address(es) ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.694 [INFO][4873] utils.go 196: Calico CNI releasing IP address ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.749 [INFO][4884] ipam_plugin.go 416: Releasing address using handleID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.772637 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:34.772637 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.765 [WARNING][4884] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.765 [INFO][4884] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.772637 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:34.772637 env[1739]: 2023-10-02 18:51:34.770 [INFO][4873] k8s.go 589: Teardown processing complete. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.773903 env[1739]: time="2023-10-02T18:51:34.773850911Z" level=info msg="TearDown network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" successfully" Oct 2 18:51:34.774031 env[1739]: time="2023-10-02T18:51:34.773997253Z" level=info msg="StopPodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" returns successfully" Oct 2 18:51:34.774911 env[1739]: time="2023-10-02T18:51:34.774865831Z" level=info msg="RemovePodSandbox for \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" Oct 2 18:51:34.775214 env[1739]: time="2023-10-02T18:51:34.775149434Z" level=info msg="Forcibly stopping sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\"" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.880 [WARNING][4902] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"eaa778dd-c0ca-40d3-87cc-9e89e186ed0a", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 50, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"134151cc5879d0ca6b6b9d5bdfd5885f6ccd578b3f9fbcb2c46aef24fd833113", Pod:"calico-kube-controllers-74b9887bb6-524h6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicac67bec16d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.881 [INFO][4902] k8s.go 576: Cleaning up netns ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.881 [INFO][4902] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" iface="eth0" netns="" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.882 [INFO][4902] k8s.go 583: Releasing IP address(es) ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.882 [INFO][4902] utils.go 196: Calico CNI releasing IP address ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.939 [INFO][4908] ipam_plugin.go 416: Releasing address using handleID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.961619 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:51:34.961619 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.954 [WARNING][4908] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.954 [INFO][4908] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" HandleID="k8s-pod-network.fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Workload="ip--172--31--21--44-k8s-calico--kube--controllers--74b9887bb6--524h6-eth0" Oct 2 18:51:34.961619 env[1739]: time="2023-10-02T18:51:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:51:34.961619 env[1739]: 2023-10-02 18:51:34.959 [INFO][4902] k8s.go 589: Teardown processing complete. ContainerID="fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5" Oct 2 18:51:34.962736 env[1739]: time="2023-10-02T18:51:34.962684702Z" level=info msg="TearDown network for sandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" successfully" Oct 2 18:51:34.967738 env[1739]: time="2023-10-02T18:51:34.967676424Z" level=info msg="RemovePodSandbox \"fba40f2167b7e5d54e17a923ac6982f8f5cc9243e6c7c87cd3af4884a48670d5\" returns successfully" Oct 2 18:51:36.037990 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.ZMrFtw.mount: Deactivated successfully. Oct 2 18:51:36.492106 env[1739]: time="2023-10-02T18:51:36.491944656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:51:36.712314 env[1739]: time="2023-10-02T18:51:36.712226728Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:36.714038 env[1739]: time="2023-10-02T18:51:36.713980685Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:36.714806 kubelet[2866]: E1002 18:51:36.714659 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:36.714806 kubelet[2866]: E1002 18:51:36.714748 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:51:36.716378 kubelet[2866]: E1002 18:51:36.716166 2866 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:36.718037 env[1739]: time="2023-10-02T18:51:36.717982935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:51:36.896191 env[1739]: time="2023-10-02T18:51:36.896106874Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:51:36.897299 env[1739]: time="2023-10-02T18:51:36.897230648Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:51:36.897735 kubelet[2866]: E1002 18:51:36.897683 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:36.897963 kubelet[2866]: E1002 18:51:36.897929 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:51:36.898268 kubelet[2866]: E1002 18:51:36.898229 2866 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:51:36.898632 kubelet[2866]: E1002 18:51:36.898606 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:37.110896 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.uqbeU1.mount: Deactivated successfully. Oct 2 18:51:37.188595 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.9nBtkR.mount: Deactivated successfully. Oct 2 18:51:40.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.44:22-139.178.89.65:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:40.340246 systemd[1]: Started sshd@8-172.31.21.44:22-139.178.89.65:50040.service. Oct 2 18:51:40.342684 kernel: kauditd_printk_skb: 82 callbacks suppressed Oct 2 18:51:40.342733 kernel: audit: type=1130 audit(1696272700.339:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.44:22-139.178.89.65:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:40.521000 audit[4981]: USER_ACCT pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.522798 sshd[4981]: Accepted publickey for core from 139.178.89.65 port 50040 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:40.535000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.537451 sshd[4981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:40.546306 kernel: audit: type=1101 audit(1696272700.521:1338): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.546439 kernel: audit: type=1103 audit(1696272700.535:1339): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.555141 kernel: audit: type=1006 audit(1696272700.535:1340): pid=4981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 18:51:40.535000 audit[4981]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc618e00 a2=3 a3=1 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:40.567572 kernel: audit: type=1300 audit(1696272700.535:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc618e00 a2=3 a3=1 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:40.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:40.571585 kernel: audit: type=1327 audit(1696272700.535:1340): proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:40.575199 systemd-logind[1735]: New session 9 of user core. Oct 2 18:51:40.577811 systemd[1]: Started session-9.scope. Oct 2 18:51:40.587000 audit[4981]: USER_START pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.599000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.610752 kernel: audit: type=1105 audit(1696272700.587:1341): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.610864 kernel: audit: type=1103 audit(1696272700.599:1342): pid=4983 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.872953 sshd[4981]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:40.874000 audit[4981]: USER_END pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.878000 audit[4981]: CRED_DISP pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.887948 systemd[1]: sshd@8-172.31.21.44:22-139.178.89.65:50040.service: Deactivated successfully. Oct 2 18:51:40.889278 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 18:51:40.896724 kernel: audit: type=1106 audit(1696272700.874:1343): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.896831 kernel: audit: type=1104 audit(1696272700.878:1344): pid=4981 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:40.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.44:22-139.178.89.65:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:40.898435 systemd-logind[1735]: Session 9 logged out. Waiting for processes to exit. Oct 2 18:51:40.900185 systemd-logind[1735]: Removed session 9. Oct 2 18:51:43.370000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:43.370000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000cbbd00 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:43.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:43.375000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:43.375000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e64e40 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:43.375000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:43.376000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:43.376000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e64e60 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:43.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:43.381000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:51:43.381000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e64e80 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:51:43.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:51:46.035115 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.3ivnp5.mount: Deactivated successfully. Oct 2 18:51:47.112048 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.lvn8M8.mount: Deactivated successfully. Oct 2 18:51:47.196650 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.fYcoPN.mount: Deactivated successfully. Oct 2 18:51:50.905295 systemd[1]: Started sshd@9-172.31.21.44:22-139.178.89.65:54840.service. Oct 2 18:51:50.918379 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 18:51:50.918566 kernel: audit: type=1130 audit(1696272710.906:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.44:22-139.178.89.65:54840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:50.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.44:22-139.178.89.65:54840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:51.091000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.095584 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:51.096841 sshd[5062]: Accepted publickey for core from 139.178.89.65 port 54840 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:51.094000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.112363 kernel: audit: type=1101 audit(1696272711.091:1351): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.112446 kernel: audit: type=1103 audit(1696272711.094:1352): pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.118960 kernel: audit: type=1006 audit(1696272711.094:1353): pid=5062 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 18:51:51.094000 audit[5062]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd7df390 a2=3 a3=1 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:51.130170 kernel: audit: type=1300 audit(1696272711.094:1353): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd7df390 a2=3 a3=1 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:51.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:51.134808 kernel: audit: type=1327 audit(1696272711.094:1353): proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:51.142942 systemd-logind[1735]: New session 10 of user core. Oct 2 18:51:51.144140 systemd[1]: Started session-10.scope. Oct 2 18:51:51.156000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.170310 kernel: audit: type=1105 audit(1696272711.156:1354): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.170000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.181176 kernel: audit: type=1103 audit(1696272711.170:1355): pid=5067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.477450 sshd[5062]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:51.480000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.483591 systemd-logind[1735]: Session 10 logged out. Waiting for processes to exit. Oct 2 18:51:51.480000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.504347 kernel: audit: type=1106 audit(1696272711.480:1356): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.504497 kernel: audit: type=1104 audit(1696272711.480:1357): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.494983 systemd[1]: sshd@9-172.31.21.44:22-139.178.89.65:54840.service: Deactivated successfully. Oct 2 18:51:51.496362 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 18:51:51.501653 systemd-logind[1735]: Removed session 10. Oct 2 18:51:51.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.44:22-139.178.89.65:54840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:51.512724 kubelet[2866]: E1002 18:51:51.512689 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:51:51.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.44:22-139.178.89.65:54850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:51.522557 systemd[1]: Started sshd@10-172.31.21.44:22-139.178.89.65:54850.service. Oct 2 18:51:51.711000 audit[5080]: USER_ACCT pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.711607 sshd[5080]: Accepted publickey for core from 139.178.89.65 port 54850 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:51.714000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.714000 audit[5080]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2d6b9d0 a2=3 a3=1 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:51.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:51.715368 sshd[5080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:51.725401 systemd[1]: Started session-11.scope. Oct 2 18:51:51.726510 systemd-logind[1735]: New session 11 of user core. Oct 2 18:51:51.734000 audit[5080]: USER_START pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:51.741000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.318016 sshd[5080]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:52.320000 audit[5080]: USER_END pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.321000 audit[5080]: CRED_DISP pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.326691 systemd[1]: sshd@10-172.31.21.44:22-139.178.89.65:54850.service: Deactivated successfully. Oct 2 18:51:52.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.44:22-139.178.89.65:54850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:52.328151 systemd-logind[1735]: Session 11 logged out. Waiting for processes to exit. Oct 2 18:51:52.329247 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 18:51:52.331439 systemd-logind[1735]: Removed session 11. Oct 2 18:51:52.356277 systemd[1]: Started sshd@11-172.31.21.44:22-139.178.89.65:54858.service. Oct 2 18:51:52.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.44:22-139.178.89.65:54858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:52.533000 audit[5090]: USER_ACCT pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.535027 sshd[5090]: Accepted publickey for core from 139.178.89.65 port 54858 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:51:52.536000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.536000 audit[5090]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd35eed10 a2=3 a3=1 items=0 ppid=1 pid=5090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:51:52.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:51:52.538867 sshd[5090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:51:52.547174 systemd-logind[1735]: New session 12 of user core. Oct 2 18:51:52.550512 systemd[1]: Started session-12.scope. Oct 2 18:51:52.565000 audit[5090]: USER_START pid=5090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.571000 audit[5092]: CRED_ACQ pid=5092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.846486 sshd[5090]: pam_unix(sshd:session): session closed for user core Oct 2 18:51:52.847000 audit[5090]: USER_END pid=5090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.848000 audit[5090]: CRED_DISP pid=5090 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:51:52.854247 systemd[1]: sshd@11-172.31.21.44:22-139.178.89.65:54858.service: Deactivated successfully. Oct 2 18:51:52.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.44:22-139.178.89.65:54858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:51:52.855634 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 18:51:52.856196 systemd-logind[1735]: Session 12 logged out. Waiting for processes to exit. Oct 2 18:51:52.858563 systemd-logind[1735]: Removed session 12. Oct 2 18:52:02.879824 systemd[1]: Started sshd@12-172.31.21.44:22-139.178.89.65:38772.service. Oct 2 18:52:02.892038 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 18:52:02.892152 kernel: audit: type=1130 audit(1696272722.879:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.44:22-139.178.89.65:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:52:02.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.44:22-139.178.89.65:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:52:03.063000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.065440 sshd[5166]: Accepted publickey for core from 139.178.89.65 port 38772 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:52:03.077219 kernel: audit: type=1101 audit(1696272723.063:1378): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.078000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.080763 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:52:03.097511 kernel: audit: type=1103 audit(1696272723.078:1379): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.097833 kernel: audit: type=1006 audit(1696272723.078:1380): pid=5166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 18:52:03.097966 kernel: audit: type=1300 audit(1696272723.078:1380): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4b34aa0 a2=3 a3=1 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:03.078000 audit[5166]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4b34aa0 a2=3 a3=1 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:03.104968 systemd[1]: Started session-13.scope. Oct 2 18:52:03.107106 systemd-logind[1735]: New session 13 of user core. Oct 2 18:52:03.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:52:03.114047 kernel: audit: type=1327 audit(1696272723.078:1380): proctitle=737368643A20636F7265205B707269765D Oct 2 18:52:03.123000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.131000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.147062 kernel: audit: type=1105 audit(1696272723.123:1381): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.147194 kernel: audit: type=1103 audit(1696272723.131:1382): pid=5168 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.404692 sshd[5166]: pam_unix(sshd:session): session closed for user core Oct 2 18:52:03.406000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.411956 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 18:52:03.413558 systemd[1]: sshd@12-172.31.21.44:22-139.178.89.65:38772.service: Deactivated successfully. Oct 2 18:52:03.408000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.430055 kernel: audit: type=1106 audit(1696272723.406:1383): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.430247 kernel: audit: type=1104 audit(1696272723.408:1384): pid=5166 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:52:03.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.44:22-139.178.89.65:38772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:52:03.431183 systemd-logind[1735]: Session 13 logged out. Waiting for processes to exit. Oct 2 18:52:03.433251 systemd-logind[1735]: Removed session 13. Oct 2 18:52:06.491563 env[1739]: time="2023-10-02T18:52:06.491485405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:52:06.684176 env[1739]: time="2023-10-02T18:52:06.684040739Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:52:06.685527 env[1739]: time="2023-10-02T18:52:06.685436683Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:52:06.686316 kubelet[2866]: E1002 18:52:06.685850 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:52:06.686316 kubelet[2866]: E1002 18:52:06.685917 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:52:06.686316 kubelet[2866]: E1002 18:52:06.686091 2866 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:52:06.688882 env[1739]: time="2023-10-02T18:52:06.688809264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:52:06.895882 env[1739]: time="2023-10-02T18:52:06.895792336Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:52:06.897340 env[1739]: time="2023-10-02T18:52:06.897253850Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:52:06.897824 kubelet[2866]: E1002 18:52:06.897758 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:52:06.898024 kubelet[2866]: E1002 18:52:06.897878 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:52:06.898811 kubelet[2866]: E1002 18:52:06.898710 2866 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-lwmd6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-m7c2m_calico-system(8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:52:06.899155 kubelet[2866]: E1002 18:52:06.898899 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:52:07.121245 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.Ty4f1A.mount: Deactivated successfully. Oct 2 18:52:07.218147 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.piy3fP.mount: Deactivated successfully. Oct 2 18:52:09.162017 kubelet[2866]: I1002 18:52:09.161971 2866 topology_manager.go:215] "Topology Admit Handler" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" podNamespace="calico-apiserver" podName="calico-apiserver-b467cb9df-n9nkr" Oct 2 18:52:09.177003 systemd[1]: Created slice kubepods-besteffort-pod9e3f74d8_2491_4b0b_80bf_4c7fca213f75.slice. Oct 2 18:52:09.222000 audit[5239]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.226438 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 18:52:09.226578 kernel: audit: type=1325 audit(1696272729.222:1386): table=filter:113 family=2 entries=9 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.222000 audit[5239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.247251 kubelet[2866]: I1002 18:52:09.247209 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9e3f74d8-2491-4b0b-80bf-4c7fca213f75-calico-apiserver-certs\") pod \"calico-apiserver-b467cb9df-n9nkr\" (UID: \"9e3f74d8-2491-4b0b-80bf-4c7fca213f75\") " pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" Oct 2 18:52:09.247525 kubelet[2866]: I1002 18:52:09.247502 2866 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7w8ps\" (UniqueName: \"kubernetes.io/projected/9e3f74d8-2491-4b0b-80bf-4c7fca213f75-kube-api-access-7w8ps\") pod \"calico-apiserver-b467cb9df-n9nkr\" (UID: \"9e3f74d8-2491-4b0b-80bf-4c7fca213f75\") " pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" Oct 2 18:52:09.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.249257 kernel: audit: type=1300 audit(1696272729.222:1386): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.225000 audit[5239]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.263715 kernel: audit: type=1327 audit(1696272729.222:1386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.263820 kernel: audit: type=1325 audit(1696272729.225:1387): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.225000 audit[5239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.277131 kernel: audit: type=1300 audit(1696272729.225:1387): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe3e37260 a2=0 a3=ffff88b2c6c0 items=0 ppid=3027 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.283524 kernel: audit: type=1327 audit(1696272729.225:1387): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.293000 audit[5241]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.293000 audit[5241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff33480d0 a2=0 a3=ffffa8cce6c0 items=0 ppid=3027 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.313994 kernel: audit: type=1325 audit(1696272729.293:1388): table=filter:115 family=2 entries=10 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.314190 kernel: audit: type=1300 audit(1696272729.293:1388): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff33480d0 a2=0 a3=ffffa8cce6c0 items=0 ppid=3027 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.320435 kernel: audit: type=1327 audit(1696272729.293:1388): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.296000 audit[5241]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.328381 kernel: audit: type=1325 audit(1696272729.296:1389): table=nat:116 family=2 entries=20 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:09.296000 audit[5241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff33480d0 a2=0 a3=ffffa8cce6c0 items=0 ppid=3027 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:09.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:09.349029 kubelet[2866]: E1002 18:52:09.348965 2866 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 18:52:09.349414 kubelet[2866]: E1002 18:52:09.349375 2866 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/9e3f74d8-2491-4b0b-80bf-4c7fca213f75-calico-apiserver-certs podName:9e3f74d8-2491-4b0b-80bf-4c7fca213f75 nodeName:}" failed. No retries permitted until 2023-10-02 18:52:09.849052695 +0000 UTC m=+96.879732807 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/9e3f74d8-2491-4b0b-80bf-4c7fca213f75-calico-apiserver-certs") pod "calico-apiserver-b467cb9df-n9nkr" (UID: "9e3f74d8-2491-4b0b-80bf-4c7fca213f75") : secret "calico-apiserver-certs" not found Oct 2 18:52:10.083511 env[1739]: time="2023-10-02T18:52:10.083005464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b467cb9df-n9nkr,Uid:9e3f74d8-2491-4b0b-80bf-4c7fca213f75,Namespace:calico-apiserver,Attempt:0,}" Oct 2 18:52:10.335785 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:52:10.335969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ecef85c11b: link becomes ready Oct 2 18:52:10.348871 systemd-networkd[1558]: cali6ecef85c11b: Link UP Oct 2 18:52:10.348891 systemd-networkd[1558]: cali6ecef85c11b: Gained carrier Oct 2 18:52:10.353061 (udev-worker)[5263]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.189 [INFO][5245] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0 calico-apiserver-b467cb9df- calico-apiserver 9e3f74d8-2491-4b0b-80bf-4c7fca213f75 1040 0 2023-10-02 18:52:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:b467cb9df projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-44 calico-apiserver-b467cb9df-n9nkr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6ecef85c11b [] []}} ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.189 [INFO][5245] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.260 [INFO][5256] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" HandleID="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Workload="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.280 [INFO][5256] ipam_plugin.go 269: Auto assigning IP ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" HandleID="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Workload="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000415fb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-44", "pod":"calico-apiserver-b467cb9df-n9nkr", "timestamp":"2023-10-02 18:52:10.260531269 +0000 UTC"}, Hostname:"ip-172-31-21-44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:52:10.371036 env[1739]: time="2023-10-02T18:52:10Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:52:10.371036 env[1739]: time="2023-10-02T18:52:10Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.281 [INFO][5256] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-44' Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.284 [INFO][5256] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.291 [INFO][5256] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.299 [INFO][5256] ipam.go 489: Trying affinity for 192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.302 [INFO][5256] ipam.go 155: Attempting to load block cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.307 [INFO][5256] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.75.64/26 host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.307 [INFO][5256] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.75.64/26 handle="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.309 [INFO][5256] ipam.go 1682: Creating new handle: k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3 Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.315 [INFO][5256] ipam.go 1203: Writing block in order to claim IPs block=192.168.75.64/26 handle="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.324 [INFO][5256] ipam.go 1216: Successfully claimed IPs: [192.168.75.69/26] block=192.168.75.64/26 handle="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.324 [INFO][5256] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.75.69/26] handle="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" host="ip-172-31-21-44" Oct 2 18:52:10.371036 env[1739]: time="2023-10-02T18:52:10Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:52:10.371036 env[1739]: 2023-10-02 18:52:10.324 [INFO][5256] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.75.69/26] IPv6=[] ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" HandleID="k8s-pod-network.713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Workload="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.327 [INFO][5245] k8s.go 383: Populated endpoint ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0", GenerateName:"calico-apiserver-b467cb9df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e3f74d8-2491-4b0b-80bf-4c7fca213f75", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 52, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b467cb9df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"", Pod:"calico-apiserver-b467cb9df-n9nkr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ecef85c11b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.327 [INFO][5245] k8s.go 384: Calico CNI using IPs: [192.168.75.69/32] ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.327 [INFO][5245] dataplane_linux.go 68: Setting the host side veth name to cali6ecef85c11b ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.336 [INFO][5245] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.350 [INFO][5245] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0", GenerateName:"calico-apiserver-b467cb9df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e3f74d8-2491-4b0b-80bf-4c7fca213f75", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 52, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b467cb9df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-44", ContainerID:"713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3", Pod:"calico-apiserver-b467cb9df-n9nkr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ecef85c11b", MAC:"de:4f:43:e9:94:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:52:10.372394 env[1739]: 2023-10-02 18:52:10.364 [INFO][5245] k8s.go 489: Wrote updated endpoint to datastore ContainerID="713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3" Namespace="calico-apiserver" Pod="calico-apiserver-b467cb9df-n9nkr" WorkloadEndpoint="ip--172--31--21--44-k8s-calico--apiserver--b467cb9df--n9nkr-eth0" Oct 2 18:52:10.434314 env[1739]: time="2023-10-02T18:52:10.433929665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:52:10.434314 env[1739]: time="2023-10-02T18:52:10.434041797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:52:10.434314 env[1739]: time="2023-10-02T18:52:10.434102064Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:52:10.435167 env[1739]: time="2023-10-02T18:52:10.435013272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3 pid=5287 runtime=io.containerd.runc.v2 Oct 2 18:52:10.488699 systemd[1]: Started cri-containerd-713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3.scope. Oct 2 18:52:10.549000 audit[5320]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=5320 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:52:10.549000 audit[5320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=fffffa594670 a2=0 a3=ffff8b2b0fa0 items=0 ppid=3910 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.549000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.554000 audit: BPF prog-id=182 op=LOAD Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5287 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336131623035646536306131313064633965316565323261643562 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5287 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336131623035646536306131313064633965316565323261643562 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit: BPF prog-id=183 op=LOAD Oct 2 18:52:10.555000 audit[5299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5287 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336131623035646536306131313064633965316565323261643562 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.555000 audit: BPF prog-id=184 op=LOAD Oct 2 18:52:10.555000 audit[5299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5287 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336131623035646536306131313064633965316565323261643562 Oct 2 18:52:10.556000 audit: BPF prog-id=184 op=UNLOAD Oct 2 18:52:10.556000 audit: BPF prog-id=183 op=UNLOAD Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { perfmon } for pid=5299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit[5299]: AVC avc: denied { bpf } for pid=5299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:52:10.556000 audit: BPF prog-id=185 op=LOAD Oct 2 18:52:10.556000 audit[5299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5287 pid=5299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:10.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336131623035646536306131313064633965316565323261643562 Oct 2 18:52:10.607118 env[1739]: time="2023-10-02T18:52:10.606903268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b467cb9df-n9nkr,Uid:9e3f74d8-2491-4b0b-80bf-4c7fca213f75,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"713a1b05de60a110dc9e1ee22ad5b2312368196ef231a55eeeaa837084dd16e3\"" Oct 2 18:52:10.615492 env[1739]: time="2023-10-02T18:52:10.613454761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:52:10.806879 env[1739]: time="2023-10-02T18:52:10.806780540Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:52:10.808155 env[1739]: time="2023-10-02T18:52:10.808091460Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:52:10.808510 kubelet[2866]: E1002 18:52:10.808471 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:52:10.809064 kubelet[2866]: E1002 18:52:10.808557 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:52:10.809280 kubelet[2866]: E1002 18:52:10.809209 2866 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7w8ps,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-b467cb9df-n9nkr_calico-apiserver(9e3f74d8-2491-4b0b-80bf-4c7fca213f75): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:52:10.809477 kubelet[2866]: E1002 18:52:10.809317 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" Oct 2 18:52:10.988813 kubelet[2866]: E1002 18:52:10.988663 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" Oct 2 18:52:11.038000 audit[5327]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:11.038000 audit[5327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe59d0bb0 a2=0 a3=ffffa83396c0 items=0 ppid=3027 pid=5327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:11.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:11.041000 audit[5327]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:52:11.041000 audit[5327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe59d0bb0 a2=0 a3=ffffa83396c0 items=0 ppid=3027 pid=5327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:52:11.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:52:11.443419 systemd-networkd[1558]: cali6ecef85c11b: Gained IPv6LL Oct 2 18:52:11.992152 kubelet[2866]: E1002 18:52:11.992117 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" Oct 2 18:52:19.492088 kubelet[2866]: E1002 18:52:19.492020 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:52:25.491112 env[1739]: time="2023-10-02T18:52:25.490669331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:52:25.672432 env[1739]: time="2023-10-02T18:52:25.672200889Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:52:25.673591 env[1739]: time="2023-10-02T18:52:25.673530353Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:52:25.674058 kubelet[2866]: E1002 18:52:25.674003 2866 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:52:25.674658 kubelet[2866]: E1002 18:52:25.674156 2866 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:52:25.674658 kubelet[2866]: E1002 18:52:25.674316 2866 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7w8ps,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-b467cb9df-n9nkr_calico-apiserver(9e3f74d8-2491-4b0b-80bf-4c7fca213f75): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:52:25.674658 kubelet[2866]: E1002 18:52:25.674384 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" Oct 2 18:52:28.982000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:28.985205 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 2 18:52:28.985318 kernel: audit: type=1400 audit(1696272748.982:1412): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:28.982000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.004512 kernel: audit: type=1400 audit(1696272748.982:1411): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:28.982000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4011292960 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:29.016910 kernel: audit: type=1300 audit(1696272748.982:1412): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4011292960 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:28.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:28.983000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.037329 kernel: audit: type=1327 audit(1696272748.982:1412): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.037496 kernel: audit: type=1400 audit(1696272748.983:1413): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.037555 kernel: audit: type=1300 audit(1696272748.983:1413): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40070efe60 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:28.983000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40070efe60 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:28.983000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.060171 kernel: audit: type=1327 audit(1696272748.983:1413): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.060271 kernel: audit: type=1300 audit(1696272748.982:1411): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4007329740 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:28.982000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4007329740 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:28.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.082775 kernel: audit: type=1327 audit(1696272748.982:1411): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.098000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.098000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40073298c0 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:29.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.109121 kernel: audit: type=1400 audit(1696272749.098:1414): avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.112000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.112000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4002d68150 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:29.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.113000 audit[2637]: AVC avc: denied { watch } for pid=2637 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.113000 audit[2637]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40057eaa20 a2=fc6 a3=0 items=0 ppid=2454 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c327,c739 key=(null) Oct 2 18:52:29.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 18:52:29.345000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.345000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b8b890 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:52:29.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:52:29.345000 audit[2624]: AVC avc: denied { watch } for pid=2624 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:52:29.345000 audit[2624]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d11280 a2=fc6 a3=0 items=0 ppid=2467 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c539 key=(null) Oct 2 18:52:29.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:52:31.491420 kubelet[2866]: E1002 18:52:31.491374 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-m7c2m" podUID="8f2df03e-78e3-4fc8-a756-5eb3c0cbf4d6" Oct 2 18:52:36.212997 systemd[1]: run-containerd-runc-k8s.io-1f7a28d3219b47f2d3a027b2992d3b6827e520f4e4dcb3f18989000e0fe644f7-runc.k7et8S.mount: Deactivated successfully. Oct 2 18:52:36.491374 kubelet[2866]: E1002 18:52:36.491232 2866 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-b467cb9df-n9nkr" podUID="9e3f74d8-2491-4b0b-80bf-4c7fca213f75" Oct 2 18:52:37.186991 systemd[1]: run-containerd-runc-k8s.io-ca43488cfcb729969be931e7c849f9823723c8e183111388c55b112649faa43b-runc.lzgQSm.mount: Deactivated successfully.