Oct 2 20:35:49.069208 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 20:35:49.069227 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 20:35:49.069235 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Oct 2 20:35:49.069242 kernel: printk: bootconsole [pl11] enabled Oct 2 20:35:49.069247 kernel: efi: EFI v2.70 by EDK II Oct 2 20:35:49.069253 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 Oct 2 20:35:49.069259 kernel: random: crng init done Oct 2 20:35:49.069264 kernel: ACPI: Early table checksum verification disabled Oct 2 20:35:49.069270 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL) Oct 2 20:35:49.069275 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069281 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069287 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 20:35:49.069292 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069298 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069304 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069310 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069316 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069323 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069329 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Oct 2 20:35:49.069335 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.069340 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Oct 2 20:35:49.069346 kernel: NUMA: Failed to initialise from firmware Oct 2 20:35:49.069352 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:49.069357 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Oct 2 20:35:49.069363 kernel: Zone ranges: Oct 2 20:35:49.069369 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Oct 2 20:35:49.069374 kernel: DMA32 empty Oct 2 20:35:49.069381 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:49.069386 kernel: Movable zone start for each node Oct 2 20:35:49.069392 kernel: Early memory node ranges Oct 2 20:35:49.069398 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Oct 2 20:35:49.069403 kernel: node 0: [mem 0x0000000000824000-0x000000003ec84fff] Oct 2 20:35:49.069409 kernel: node 0: [mem 0x000000003ec85000-0x000000003ecadfff] Oct 2 20:35:49.069415 kernel: node 0: [mem 0x000000003ecae000-0x000000003fd2dfff] Oct 2 20:35:49.069420 kernel: node 0: [mem 0x000000003fd2e000-0x000000003fd81fff] Oct 2 20:35:49.069426 kernel: node 0: [mem 0x000000003fd82000-0x000000003fd8dfff] Oct 2 20:35:49.069432 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fd91fff] Oct 2 20:35:49.069438 kernel: node 0: [mem 0x000000003fd92000-0x000000003fffffff] Oct 2 20:35:49.069443 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:49.069450 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:49.069459 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Oct 2 20:35:49.069465 kernel: psci: probing for conduit method from ACPI. Oct 2 20:35:49.069471 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 20:35:49.069477 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 20:35:49.069484 kernel: psci: MIGRATE_INFO_TYPE not supported. Oct 2 20:35:49.069490 kernel: psci: SMC Calling Convention v1.4 Oct 2 20:35:49.069496 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Oct 2 20:35:49.069502 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Oct 2 20:35:49.069508 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 20:35:49.069514 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 20:35:49.069520 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 20:35:49.069526 kernel: Detected PIPT I-cache on CPU0 Oct 2 20:35:49.069532 kernel: CPU features: detected: GIC system register CPU interface Oct 2 20:35:49.069538 kernel: CPU features: detected: Hardware dirty bit management Oct 2 20:35:49.069544 kernel: CPU features: detected: Spectre-BHB Oct 2 20:35:49.069550 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 20:35:49.069566 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 20:35:49.069572 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 20:35:49.069578 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Oct 2 20:35:49.069584 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Oct 2 20:35:49.069590 kernel: Policy zone: Normal Oct 2 20:35:49.069597 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:49.069604 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:35:49.069610 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 20:35:49.069616 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:35:49.069622 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:35:49.069630 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB) Oct 2 20:35:49.069636 kernel: Memory: 3992056K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202104K reserved, 0K cma-reserved) Oct 2 20:35:49.069642 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 20:35:49.069648 kernel: trace event string verifier disabled Oct 2 20:35:49.069654 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 20:35:49.069661 kernel: rcu: RCU event tracing is enabled. Oct 2 20:35:49.069667 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 20:35:49.069673 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 20:35:49.069679 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:35:49.069685 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:35:49.069691 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 20:35:49.069703 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 20:35:49.069709 kernel: GICv3: 960 SPIs implemented Oct 2 20:35:49.069715 kernel: GICv3: 0 Extended SPIs implemented Oct 2 20:35:49.069721 kernel: GICv3: Distributor has no Range Selector support Oct 2 20:35:49.069727 kernel: Root IRQ handler: gic_handle_irq Oct 2 20:35:49.069733 kernel: GICv3: 16 PPIs implemented Oct 2 20:35:49.069743 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Oct 2 20:35:49.069749 kernel: ITS: No ITS available, not enabling LPIs Oct 2 20:35:49.069756 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:49.069762 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 20:35:49.069768 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 20:35:49.069774 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 20:35:49.069786 kernel: Console: colour dummy device 80x25 Oct 2 20:35:49.069793 kernel: printk: console [tty1] enabled Oct 2 20:35:49.069799 kernel: ACPI: Core revision 20210730 Oct 2 20:35:49.069805 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 20:35:49.069812 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:35:49.069821 kernel: LSM: Security Framework initializing Oct 2 20:35:49.069827 kernel: SELinux: Initializing. Oct 2 20:35:49.069834 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.069840 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.069848 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Oct 2 20:35:49.069857 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0 Oct 2 20:35:49.069863 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:35:49.069869 kernel: Remapping and enabling EFI services. Oct 2 20:35:49.069876 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:35:49.069882 kernel: Detected PIPT I-cache on CPU1 Oct 2 20:35:49.069888 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Oct 2 20:35:49.069894 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:49.069901 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 20:35:49.069908 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 20:35:49.069914 kernel: SMP: Total of 2 processors activated. Oct 2 20:35:49.069920 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 20:35:49.069931 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Oct 2 20:35:49.069938 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 20:35:49.069944 kernel: CPU features: detected: CRC32 instructions Oct 2 20:35:49.069950 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 20:35:49.069957 kernel: CPU features: detected: LSE atomic instructions Oct 2 20:35:49.069963 kernel: CPU features: detected: Privileged Access Never Oct 2 20:35:49.069970 kernel: CPU: All CPU(s) started at EL1 Oct 2 20:35:49.069977 kernel: alternatives: patching kernel code Oct 2 20:35:49.069987 kernel: devtmpfs: initialized Oct 2 20:35:49.069994 kernel: KASLR enabled Oct 2 20:35:49.070004 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:35:49.070011 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 20:35:49.070018 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:35:49.070025 kernel: SMBIOS 3.1.0 present. Oct 2 20:35:49.070031 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022 Oct 2 20:35:49.070038 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:35:49.070046 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 20:35:49.070052 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 20:35:49.070059 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 20:35:49.070069 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:35:49.070076 kernel: audit: type=2000 audit(0.085:1): state=initialized audit_enabled=0 res=1 Oct 2 20:35:49.070083 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:35:49.070089 kernel: cpuidle: using governor menu Oct 2 20:35:49.070097 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 20:35:49.070104 kernel: ASID allocator initialised with 32768 entries Oct 2 20:35:49.070110 kernel: ACPI: bus type PCI registered Oct 2 20:35:49.070117 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:35:49.070123 kernel: Serial: AMBA PL011 UART driver Oct 2 20:35:49.075218 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:35:49.075238 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 20:35:49.075246 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:35:49.075253 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 20:35:49.075266 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:35:49.075273 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 20:35:49.075280 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:35:49.075286 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:35:49.075293 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:35:49.075300 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:35:49.075306 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:35:49.075313 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:35:49.075320 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:35:49.075328 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 20:35:49.075335 kernel: ACPI: Interpreter enabled Oct 2 20:35:49.075341 kernel: ACPI: Using GIC for interrupt routing Oct 2 20:35:49.075348 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Oct 2 20:35:49.075355 kernel: printk: console [ttyAMA0] enabled Oct 2 20:35:49.075362 kernel: printk: bootconsole [pl11] disabled Oct 2 20:35:49.075369 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Oct 2 20:35:49.075376 kernel: iommu: Default domain type: Translated Oct 2 20:35:49.075383 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 20:35:49.075390 kernel: vgaarb: loaded Oct 2 20:35:49.075397 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:35:49.075404 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:35:49.075411 kernel: PTP clock support registered Oct 2 20:35:49.075417 kernel: Registered efivars operations Oct 2 20:35:49.075424 kernel: No ACPI PMU IRQ for CPU0 Oct 2 20:35:49.075431 kernel: No ACPI PMU IRQ for CPU1 Oct 2 20:35:49.075438 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 20:35:49.075445 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:35:49.075453 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:35:49.075459 kernel: pnp: PnP ACPI init Oct 2 20:35:49.075466 kernel: pnp: PnP ACPI: found 0 devices Oct 2 20:35:49.075473 kernel: NET: Registered PF_INET protocol family Oct 2 20:35:49.075479 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:35:49.075486 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 20:35:49.075493 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:35:49.075500 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 20:35:49.075507 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 20:35:49.075515 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 20:35:49.075522 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.075529 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.075535 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:35:49.075542 kernel: PCI: CLS 0 bytes, default 64 Oct 2 20:35:49.075549 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Oct 2 20:35:49.075555 kernel: kvm [1]: HYP mode not available Oct 2 20:35:49.075562 kernel: Initialise system trusted keyrings Oct 2 20:35:49.075568 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 20:35:49.075576 kernel: Key type asymmetric registered Oct 2 20:35:49.075583 kernel: Asymmetric key parser 'x509' registered Oct 2 20:35:49.075590 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:35:49.075596 kernel: io scheduler mq-deadline registered Oct 2 20:35:49.075603 kernel: io scheduler kyber registered Oct 2 20:35:49.075609 kernel: io scheduler bfq registered Oct 2 20:35:49.075616 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:35:49.075623 kernel: thunder_xcv, ver 1.0 Oct 2 20:35:49.075629 kernel: thunder_bgx, ver 1.0 Oct 2 20:35:49.075637 kernel: nicpf, ver 1.0 Oct 2 20:35:49.075644 kernel: nicvf, ver 1.0 Oct 2 20:35:49.075828 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 20:35:49.075891 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:35:48 UTC (1696278948) Oct 2 20:35:49.075900 kernel: efifb: probing for efifb Oct 2 20:35:49.075907 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 20:35:49.075914 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 20:35:49.075921 kernel: efifb: scrolling: redraw Oct 2 20:35:49.075931 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 20:35:49.075937 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:35:49.075944 kernel: fb0: EFI VGA frame buffer device Oct 2 20:35:49.075951 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Oct 2 20:35:49.075957 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:35:49.075964 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:35:49.075970 kernel: Segment Routing with IPv6 Oct 2 20:35:49.075977 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:35:49.075984 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:35:49.075992 kernel: Key type dns_resolver registered Oct 2 20:35:49.075998 kernel: registered taskstats version 1 Oct 2 20:35:49.076005 kernel: Loading compiled-in X.509 certificates Oct 2 20:35:49.076012 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 20:35:49.076019 kernel: Key type .fscrypt registered Oct 2 20:35:49.076025 kernel: Key type fscrypt-provisioning registered Oct 2 20:35:49.076032 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 20:35:49.076039 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:35:49.076046 kernel: ima: No architecture policies found Oct 2 20:35:49.076054 kernel: Freeing unused kernel memory: 34560K Oct 2 20:35:49.076060 kernel: Run /init as init process Oct 2 20:35:49.076067 kernel: with arguments: Oct 2 20:35:49.076073 kernel: /init Oct 2 20:35:49.076080 kernel: with environment: Oct 2 20:35:49.076086 kernel: HOME=/ Oct 2 20:35:49.076093 kernel: TERM=linux Oct 2 20:35:49.076099 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:35:49.076108 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:35:49.076119 systemd[1]: Detected virtualization microsoft. Oct 2 20:35:49.076126 systemd[1]: Detected architecture arm64. Oct 2 20:35:49.076205 systemd[1]: Running in initrd. Oct 2 20:35:49.076214 systemd[1]: No hostname configured, using default hostname. Oct 2 20:35:49.076221 systemd[1]: Hostname set to . Oct 2 20:35:49.076229 systemd[1]: Initializing machine ID from random generator. Oct 2 20:35:49.076236 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:35:49.076246 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:35:49.076253 systemd[1]: Reached target cryptsetup.target. Oct 2 20:35:49.076260 systemd[1]: Reached target paths.target. Oct 2 20:35:49.076267 systemd[1]: Reached target slices.target. Oct 2 20:35:49.076274 systemd[1]: Reached target swap.target. Oct 2 20:35:49.076282 systemd[1]: Reached target timers.target. Oct 2 20:35:49.076289 systemd[1]: Listening on iscsid.socket. Oct 2 20:35:49.076296 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:35:49.076305 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:35:49.076312 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:35:49.076319 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:35:49.076326 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:35:49.076333 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:35:49.076341 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:35:49.076348 systemd[1]: Reached target sockets.target. Oct 2 20:35:49.076355 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:35:49.076362 systemd[1]: Finished network-cleanup.service. Oct 2 20:35:49.076370 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:35:49.076378 systemd[1]: Starting systemd-journald.service... Oct 2 20:35:49.076385 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:35:49.076392 systemd[1]: Starting systemd-resolved.service... Oct 2 20:35:49.076399 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:35:49.076411 systemd-journald[276]: Journal started Oct 2 20:35:49.076458 systemd-journald[276]: Runtime Journal (/run/log/journal/472a6bd72cc84ac1bd3e6e4bab1c6577) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:35:49.054181 systemd-modules-load[277]: Inserted module 'overlay' Oct 2 20:35:49.107395 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:35:49.107417 kernel: Bridge firewalling registered Oct 2 20:35:49.107434 systemd[1]: Started systemd-journald.service. Oct 2 20:35:49.094160 systemd-resolved[278]: Positive Trust Anchors: Oct 2 20:35:49.094168 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:35:49.094196 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:35:49.205849 kernel: SCSI subsystem initialized Oct 2 20:35:49.205874 kernel: audit: type=1130 audit(1696278949.163:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.205885 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:35:49.205894 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:35:49.205903 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:35:49.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.096165 systemd-modules-load[277]: Inserted module 'br_netfilter' Oct 2 20:35:49.234927 kernel: audit: type=1130 audit(1696278949.210:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.097155 systemd-resolved[278]: Defaulting to hostname 'linux'. Oct 2 20:35:49.181370 systemd[1]: Started systemd-resolved.service. Oct 2 20:35:49.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.208492 systemd-modules-load[277]: Inserted module 'dm_multipath' Oct 2 20:35:49.210547 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:35:49.298415 kernel: audit: type=1130 audit(1696278949.235:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.298437 kernel: audit: type=1130 audit(1696278949.260:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.235434 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:35:49.324098 kernel: audit: type=1130 audit(1696278949.269:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.261051 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:35:49.351291 kernel: audit: type=1130 audit(1696278949.294:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.269812 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:35:49.294544 systemd[1]: Reached target nss-lookup.target. Oct 2 20:35:49.303384 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:35:49.346155 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:35:49.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.371971 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:35:49.387613 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:35:49.427572 kernel: audit: type=1130 audit(1696278949.396:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.414641 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:35:49.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.423876 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:35:49.480913 kernel: audit: type=1130 audit(1696278949.423:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.480936 kernel: audit: type=1130 audit(1696278949.447:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.448632 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:35:49.485842 dracut-cmdline[297]: dracut-dracut-053 Oct 2 20:35:49.492882 dracut-cmdline[297]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:49.617164 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:35:49.628149 kernel: iscsi: registered transport (tcp) Oct 2 20:35:49.648742 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:35:49.648778 kernel: QLogic iSCSI HBA Driver Oct 2 20:35:49.729817 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:35:49.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.735433 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:35:49.802153 kernel: raid6: neonx8 gen() 13825 MB/s Oct 2 20:35:49.821142 kernel: raid6: neonx8 xor() 10841 MB/s Oct 2 20:35:49.841141 kernel: raid6: neonx4 gen() 13535 MB/s Oct 2 20:35:49.861141 kernel: raid6: neonx4 xor() 11269 MB/s Oct 2 20:35:49.882141 kernel: raid6: neonx2 gen() 12938 MB/s Oct 2 20:35:49.902141 kernel: raid6: neonx2 xor() 10283 MB/s Oct 2 20:35:49.922141 kernel: raid6: neonx1 gen() 10536 MB/s Oct 2 20:35:49.943141 kernel: raid6: neonx1 xor() 8782 MB/s Oct 2 20:35:49.963141 kernel: raid6: int64x8 gen() 6298 MB/s Oct 2 20:35:49.983141 kernel: raid6: int64x8 xor() 3551 MB/s Oct 2 20:35:50.004141 kernel: raid6: int64x4 gen() 7299 MB/s Oct 2 20:35:50.024142 kernel: raid6: int64x4 xor() 3856 MB/s Oct 2 20:35:50.044141 kernel: raid6: int64x2 gen() 6152 MB/s Oct 2 20:35:50.065142 kernel: raid6: int64x2 xor() 3324 MB/s Oct 2 20:35:50.085140 kernel: raid6: int64x1 gen() 5047 MB/s Oct 2 20:35:50.109570 kernel: raid6: int64x1 xor() 2648 MB/s Oct 2 20:35:50.109579 kernel: raid6: using algorithm neonx8 gen() 13825 MB/s Oct 2 20:35:50.109587 kernel: raid6: .... xor() 10841 MB/s, rmw enabled Oct 2 20:35:50.113654 kernel: raid6: using neon recovery algorithm Oct 2 20:35:50.131144 kernel: xor: measuring software checksum speed Oct 2 20:35:50.139275 kernel: 8regs : 17319 MB/sec Oct 2 20:35:50.139285 kernel: 32regs : 20765 MB/sec Oct 2 20:35:50.143216 kernel: arm64_neon : 27835 MB/sec Oct 2 20:35:50.143226 kernel: xor: using function: arm64_neon (27835 MB/sec) Oct 2 20:35:50.202148 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 20:35:50.220060 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:35:50.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.227000 audit: BPF prog-id=7 op=LOAD Oct 2 20:35:50.228000 audit: BPF prog-id=8 op=LOAD Oct 2 20:35:50.228697 systemd[1]: Starting systemd-udevd.service... Oct 2 20:35:50.248990 systemd-udevd[475]: Using default interface naming scheme 'v252'. Oct 2 20:35:50.254466 systemd[1]: Started systemd-udevd.service. Oct 2 20:35:50.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.267438 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:35:50.295284 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Oct 2 20:35:50.349188 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:35:50.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.354941 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:35:50.398147 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:35:50.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.460159 kernel: hv_vmbus: Vmbus version:5.3 Oct 2 20:35:50.462149 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 20:35:50.462177 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 20:35:50.462186 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 20:35:50.469156 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 20:35:50.469191 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 20:35:50.471153 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 20:35:50.486161 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 20:35:50.524147 kernel: scsi host1: storvsc_host_t Oct 2 20:35:50.524330 kernel: scsi host0: storvsc_host_t Oct 2 20:35:50.548159 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 20:35:50.548232 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 20:35:50.565243 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 20:35:50.565433 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 20:35:50.571311 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 20:35:50.571464 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:35:50.579335 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:35:50.579481 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 20:35:50.579566 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 20:35:50.579642 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 20:35:50.591155 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:50.600376 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:35:50.600512 kernel: hv_netvsc 000d3a6e-af02-000d-3a6e-af02000d3a6e eth0: VF slot 1 added Oct 2 20:35:50.609159 kernel: hv_vmbus: registering driver hv_pci Oct 2 20:35:50.625233 kernel: hv_pci b9bd8a40-84b2-47aa-be59-523a572fb875: PCI VMBus probing: Using version 0x10004 Oct 2 20:35:50.637472 kernel: hv_pci b9bd8a40-84b2-47aa-be59-523a572fb875: PCI host bridge to bus 84b2:00 Oct 2 20:35:50.637655 kernel: pci_bus 84b2:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Oct 2 20:35:50.644125 kernel: pci_bus 84b2:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 20:35:50.870226 kernel: pci 84b2:00:02.0: [15b3:1018] type 00 class 0x020000 Oct 2 20:35:50.883354 kernel: pci 84b2:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:50.903221 kernel: pci 84b2:00:02.0: enabling Extended Tags Oct 2 20:35:50.928499 kernel: pci 84b2:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 84b2:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Oct 2 20:35:50.928702 kernel: pci_bus 84b2:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 20:35:50.935013 kernel: pci 84b2:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:50.976162 kernel: mlx5_core 84b2:00:02.0: firmware version: 16.31.2424 Oct 2 20:35:51.145155 kernel: mlx5_core 84b2:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Oct 2 20:35:51.211299 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:35:51.242685 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (526) Oct 2 20:35:51.260803 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:35:51.294970 kernel: hv_netvsc 000d3a6e-af02-000d-3a6e-af02000d3a6e eth0: VF registering: eth1 Oct 2 20:35:51.295164 kernel: mlx5_core 84b2:00:02.0 eth1: joined to eth0 Oct 2 20:35:51.308158 kernel: mlx5_core 84b2:00:02.0 enP33970s1: renamed from eth1 Oct 2 20:35:51.405585 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:35:51.496321 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:35:51.511213 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:35:51.518118 systemd[1]: Starting disk-uuid.service... Oct 2 20:35:51.543169 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:51.550150 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:52.558164 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:52.560164 disk-uuid[604]: The operation has completed successfully. Oct 2 20:35:52.633870 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:35:52.635253 systemd[1]: Finished disk-uuid.service. Oct 2 20:35:52.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.647908 systemd[1]: Starting verity-setup.service... Oct 2 20:35:52.687168 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 20:35:52.949871 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:35:52.959820 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:35:52.968858 systemd[1]: Finished verity-setup.service. Oct 2 20:35:52.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.025917 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:35:53.033413 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:35:53.029984 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:35:53.030713 systemd[1]: Starting ignition-setup.service... Oct 2 20:35:53.046910 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:35:53.081446 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:53.081497 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:53.081508 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:53.166728 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 20:35:53.215008 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:35:53.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.232250 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 20:35:53.232286 kernel: audit: type=1130 audit(1696278953.220:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.229840 systemd[1]: Starting systemd-networkd.service... Oct 2 20:35:53.259369 kernel: audit: type=1334 audit(1696278953.229:22): prog-id=9 op=LOAD Oct 2 20:35:53.229000 audit: BPF prog-id=9 op=LOAD Oct 2 20:35:53.274670 systemd-networkd[849]: lo: Link UP Oct 2 20:35:53.274682 systemd-networkd[849]: lo: Gained carrier Oct 2 20:35:53.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.275063 systemd-networkd[849]: Enumeration completed Oct 2 20:35:53.311281 kernel: audit: type=1130 audit(1696278953.282:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.275818 systemd-networkd[849]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:35:53.278496 systemd[1]: Started systemd-networkd.service. Oct 2 20:35:53.361277 kernel: audit: type=1130 audit(1696278953.333:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.301439 systemd[1]: Reached target network.target. Oct 2 20:35:53.397076 kernel: audit: type=1130 audit(1696278953.370:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.307813 systemd[1]: Starting iscsiuio.service... Oct 2 20:35:53.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.408271 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:53.408271 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 20:35:53.408271 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:35:53.408271 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:35:53.408271 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:35:53.408271 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:53.408271 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:35:53.529860 kernel: audit: type=1130 audit(1696278953.397:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.529888 kernel: mlx5_core 84b2:00:02.0 enP33970s1: Link up Oct 2 20:35:53.530039 kernel: audit: type=1130 audit(1696278953.474:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.325782 systemd[1]: Started iscsiuio.service. Oct 2 20:35:53.349043 systemd[1]: Starting iscsid.service... Oct 2 20:35:53.365244 systemd[1]: Finished ignition-setup.service. Oct 2 20:35:53.371288 systemd[1]: Started iscsid.service. Oct 2 20:35:53.583920 kernel: hv_netvsc 000d3a6e-af02-000d-3a6e-af02000d3a6e eth0: Data path switched to VF: enP33970s1 Oct 2 20:35:53.584072 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:35:53.584157 kernel: audit: type=1130 audit(1696278953.558:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.401036 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:35:53.427999 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:35:53.458249 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:35:53.475249 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:35:53.500577 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:35:53.511379 systemd[1]: Reached target remote-fs.target. Oct 2 20:35:53.523916 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:35:53.552667 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:35:53.578769 systemd-networkd[849]: enP33970s1: Link UP Oct 2 20:35:53.578854 systemd-networkd[849]: eth0: Link UP Oct 2 20:35:53.578977 systemd-networkd[849]: eth0: Gained carrier Oct 2 20:35:53.593328 systemd-networkd[849]: enP33970s1: Gained carrier Oct 2 20:35:53.620038 systemd-networkd[849]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:35:54.597309 systemd-networkd[849]: eth0: Gained IPv6LL Oct 2 20:35:56.275713 ignition[864]: Ignition 2.14.0 Oct 2 20:35:56.275724 ignition[864]: Stage: fetch-offline Oct 2 20:35:56.275776 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.275799 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.401116 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.401273 ignition[864]: parsed url from cmdline: "" Oct 2 20:35:56.402300 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:35:56.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.401277 ignition[864]: no config URL provided Oct 2 20:35:56.445139 kernel: audit: type=1130 audit(1696278956.412:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.413482 systemd[1]: Starting ignition-fetch.service... Oct 2 20:35:56.401283 ignition[864]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:56.401290 ignition[864]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:56.401296 ignition[864]: failed to fetch config: resource requires networking Oct 2 20:35:56.401392 ignition[864]: Ignition finished successfully Oct 2 20:35:56.429539 ignition[876]: Ignition 2.14.0 Oct 2 20:35:56.429545 ignition[876]: Stage: fetch Oct 2 20:35:56.429640 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.429662 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.432505 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.432636 ignition[876]: parsed url from cmdline: "" Oct 2 20:35:56.432639 ignition[876]: no config URL provided Oct 2 20:35:56.432644 ignition[876]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:56.432651 ignition[876]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:56.432688 ignition[876]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 20:35:56.537175 kernel: audit: type=1130 audit(1696278956.511:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.501614 unknown[876]: fetched base config from "system" Oct 2 20:35:56.466192 ignition[876]: GET result: OK Oct 2 20:35:56.501621 unknown[876]: fetched base config from "system" Oct 2 20:35:56.466279 ignition[876]: config has been read from IMDS userdata Oct 2 20:35:56.501626 unknown[876]: fetched user config from "azure" Oct 2 20:35:56.466332 ignition[876]: parsing config with SHA512: 0087ec9da4969210718e4eba7ae112342562779f9b8a18d5738606ba064485cec8025d4a94e151b1dd9145709c54c5a27cba2237268609827efa042b01b53857 Oct 2 20:35:56.507294 systemd[1]: Finished ignition-fetch.service. Oct 2 20:35:56.502119 ignition[876]: fetch: fetch complete Oct 2 20:35:56.512496 systemd[1]: Starting ignition-kargs.service... Oct 2 20:35:56.502124 ignition[876]: fetch: fetch passed Oct 2 20:35:56.502179 ignition[876]: Ignition finished successfully Oct 2 20:35:56.554932 ignition[882]: Ignition 2.14.0 Oct 2 20:35:56.581406 systemd[1]: Finished ignition-kargs.service. Oct 2 20:35:56.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.554939 ignition[882]: Stage: kargs Oct 2 20:35:56.589810 systemd[1]: Starting ignition-disks.service... Oct 2 20:35:56.555067 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.555089 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.578065 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.579434 ignition[882]: kargs: kargs passed Oct 2 20:35:56.579485 ignition[882]: Ignition finished successfully Oct 2 20:35:56.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.619613 systemd[1]: Finished ignition-disks.service. Oct 2 20:35:56.610249 ignition[888]: Ignition 2.14.0 Oct 2 20:35:56.625659 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:35:56.610255 ignition[888]: Stage: disks Oct 2 20:35:56.634046 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:35:56.610384 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.642350 systemd[1]: Reached target local-fs.target. Oct 2 20:35:56.610404 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.649415 systemd[1]: Reached target sysinit.target. Oct 2 20:35:56.613684 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.658150 systemd[1]: Reached target basic.target. Oct 2 20:35:56.618457 ignition[888]: disks: disks passed Oct 2 20:35:56.666199 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:35:56.618503 ignition[888]: Ignition finished successfully Oct 2 20:35:56.784497 systemd-fsck[896]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks Oct 2 20:35:56.796860 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:35:56.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.803053 systemd[1]: Mounting sysroot.mount... Oct 2 20:35:56.830171 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:35:56.830980 systemd[1]: Mounted sysroot.mount. Oct 2 20:35:56.838040 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:35:56.870889 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:35:56.875874 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:35:56.884114 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:35:56.887875 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:35:56.895482 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:35:56.939939 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:35:56.944970 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:35:56.976382 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Oct 2 20:35:56.976439 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:56.976455 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:56.981415 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:35:56.992561 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:56.995485 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:35:57.021575 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:35:57.034314 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:35:57.047398 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:35:57.467124 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:35:57.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.472642 systemd[1]: Starting ignition-mount.service... Oct 2 20:35:57.484193 systemd[1]: Starting sysroot-boot.service... Oct 2 20:35:57.495760 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:35:57.495860 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:35:57.529175 systemd[1]: Finished sysroot-boot.service. Oct 2 20:35:57.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.541142 ignition[973]: INFO : Ignition 2.14.0 Oct 2 20:35:57.541142 ignition[973]: INFO : Stage: mount Oct 2 20:35:57.549620 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:57.549620 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:57.549620 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:57.549620 ignition[973]: INFO : mount: mount passed Oct 2 20:35:57.549620 ignition[973]: INFO : Ignition finished successfully Oct 2 20:35:57.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.549553 systemd[1]: Finished ignition-mount.service. Oct 2 20:35:58.150205 coreos-metadata[906]: Oct 02 20:35:58.150 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:35:58.158455 coreos-metadata[906]: Oct 02 20:35:58.152 INFO Fetch successful Oct 2 20:35:58.189995 coreos-metadata[906]: Oct 02 20:35:58.189 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:35:58.214396 coreos-metadata[906]: Oct 02 20:35:58.214 INFO Fetch successful Oct 2 20:35:58.221227 coreos-metadata[906]: Oct 02 20:35:58.221 INFO wrote hostname ci-3510.3.0-a-f31f601c03 to /sysroot/etc/hostname Oct 2 20:35:58.223440 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:35:58.261260 kernel: kauditd_printk_skb: 6 callbacks suppressed Oct 2 20:35:58.261282 kernel: audit: type=1130 audit(1696278958.234:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:58.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:58.235723 systemd[1]: Starting ignition-files.service... Oct 2 20:35:58.266780 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:35:58.286145 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Oct 2 20:35:58.298477 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:58.298534 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:58.298545 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:58.308056 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:35:58.326862 ignition[1004]: INFO : Ignition 2.14.0 Oct 2 20:35:58.326862 ignition[1004]: INFO : Stage: files Oct 2 20:35:58.338438 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:58.338438 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:58.338438 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:58.338438 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:35:58.373505 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:35:58.373505 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:35:58.435177 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:35:58.443082 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:35:58.463944 unknown[1004]: wrote ssh authorized keys file for user: core Oct 2 20:35:58.469458 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:35:58.479047 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:35:58.490392 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Oct 2 20:35:58.641780 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:35:58.851375 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Oct 2 20:35:58.867651 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:35:58.867651 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 20:35:58.867651 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-arm64.tar.gz: attempt #1 Oct 2 20:35:58.957814 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:35:59.099037 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: ebd055e9b2888624d006decd582db742131ed815d059d529ba21eaf864becca98a84b20a10eec91051b9d837c6855d28d5042bf5e9a454f4540aec6b82d37e96 Oct 2 20:35:59.114957 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 20:35:59.114957 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:35:59.114957 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubeadm: attempt #1 Oct 2 20:35:59.219417 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:36:00.879150 kernel: mlx5_core 84b2:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count Oct 2 20:36:01.154442 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: daab8965a4f617d1570d04c031ab4d55fff6aa13a61f0e4045f2338947f9fb0ee3a80fdee57cfe86db885390595460342181e1ec52b89f127ef09c393ae3db7f Oct 2 20:36:01.170497 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:36:01.170497 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:01.170497 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubelet: attempt #1 Oct 2 20:36:01.395433 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:36:03.514182 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 7b872a34d86e8aa75455a62a20f5cf16426de2ae54ffb8e0250fead920838df818201b8512c2f8bf4c939e5b21babab371f3a48803e2e861da9e6f8cdd022324 Oct 2 20:36:03.530149 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:03.530149 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:03.530149 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubectl: attempt #1 Oct 2 20:36:03.592649 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 20:36:04.995605 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 733208fa18e683adcd80c621d3be1a1ba35340ff656b78c86068b544045d8710ee100d0ff8df3bf55f607b1863d374f634f2d10b2d37e2be90e2b20dd1cc92ab Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:05.011737 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:05.153676 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1007) Oct 2 20:36:05.153700 kernel: audit: type=1130 audit(1696278965.098:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem283279742" Oct 2 20:36:05.153761 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem283279742": device or resource busy Oct 2 20:36:05.153761 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem283279742", trying btrfs: device or resource busy Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem283279742" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem283279742" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem283279742" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem283279742" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3450126885" Oct 2 20:36:05.153761 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3450126885": device or resource busy Oct 2 20:36:05.153761 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3450126885", trying btrfs: device or resource busy Oct 2 20:36:05.153761 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3450126885" Oct 2 20:36:05.414850 kernel: audit: type=1130 audit(1696278965.199:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.414879 kernel: audit: type=1131 audit(1696278965.199:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.414899 kernel: audit: type=1130 audit(1696278965.270:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.414911 kernel: audit: type=1130 audit(1696278965.389:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.058717 systemd[1]: mnt-oem283279742.mount: Deactivated successfully. Oct 2 20:36:05.422252 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3450126885" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3450126885" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3450126885" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(13): [started] processing unit "waagent.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(13): [finished] processing unit "waagent.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(14): [started] processing unit "nvidia.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(14): [finished] processing unit "nvidia.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" Oct 2 20:36:05.422252 ignition[1004]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" Oct 2 20:36:05.711148 kernel: audit: type=1131 audit(1696278965.417:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.711178 kernel: audit: type=1130 audit(1696278965.536:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.711188 kernel: audit: type=1131 audit(1696278965.623:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.086962 systemd[1]: Finished ignition-files.service. Oct 2 20:36:05.719243 ignition[1004]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:05.719243 ignition[1004]: INFO : files: files passed Oct 2 20:36:05.719243 ignition[1004]: INFO : Ignition finished successfully Oct 2 20:36:05.846738 kernel: audit: type=1131 audit(1696278965.786:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.846762 kernel: audit: type=1131 audit(1696278965.824:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.846842 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:36:05.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.099071 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:36:05.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.138245 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:36:05.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.139166 systemd[1]: Starting ignition-quench.service... Oct 2 20:36:05.168782 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:36:05.168947 systemd[1]: Finished ignition-quench.service. Oct 2 20:36:05.257192 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:36:05.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.301633 systemd[1]: Reached target ignition-complete.target. Oct 2 20:36:05.928531 ignition[1042]: INFO : Ignition 2.14.0 Oct 2 20:36:05.928531 ignition[1042]: INFO : Stage: umount Oct 2 20:36:05.928531 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:36:05.928531 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:36:05.928531 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:36:05.928531 ignition[1042]: INFO : umount: umount passed Oct 2 20:36:05.928531 ignition[1042]: INFO : Ignition finished successfully Oct 2 20:36:05.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.327548 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:36:05.374094 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:36:06.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.374215 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:36:05.417376 systemd[1]: Reached target initrd-fs.target. Oct 2 20:36:05.426361 systemd[1]: Reached target initrd.target. Oct 2 20:36:05.458512 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:36:05.468075 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:36:05.524978 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:36:06.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.537605 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:36:05.579034 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:36:05.586004 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:36:06.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.597723 systemd[1]: Stopped target timers.target. Oct 2 20:36:06.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.608549 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:36:06.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:06.118000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:36:05.608611 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:36:05.623689 systemd[1]: Stopped target initrd.target. Oct 2 20:36:06.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.655605 systemd[1]: Stopped target basic.target. Oct 2 20:36:06.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.666901 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:36:06.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.679609 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:36:06.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.691835 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:36:05.703996 systemd[1]: Stopped target remote-fs.target. Oct 2 20:36:05.715370 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:36:06.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.723652 systemd[1]: Stopped target sysinit.target. Oct 2 20:36:05.735513 systemd[1]: Stopped target local-fs.target. Oct 2 20:36:05.747349 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:36:06.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.759691 systemd[1]: Stopped target swap.target. Oct 2 20:36:06.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.771736 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:36:06.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.771800 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:36:05.786344 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:36:05.816821 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:36:05.816873 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:36:06.288642 kernel: hv_netvsc 000d3a6e-af02-000d-3a6e-af02000d3a6e eth0: Data path switched from VF: enP33970s1 Oct 2 20:36:06.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.825070 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:36:06.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:06.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.825107 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:36:05.852055 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:36:05.852094 systemd[1]: Stopped ignition-files.service. Oct 2 20:36:05.865050 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:36:05.865090 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:36:05.885713 systemd[1]: Stopping ignition-mount.service... Oct 2 20:36:05.907342 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:36:05.907418 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:36:05.914987 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:36:05.920659 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:36:05.920733 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:36:05.931239 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:36:05.931284 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:36:05.936517 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:36:05.936623 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:36:05.949443 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:36:05.949549 systemd[1]: Stopped ignition-mount.service. Oct 2 20:36:05.961187 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:36:05.961253 systemd[1]: Stopped ignition-disks.service. Oct 2 20:36:05.978848 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:36:05.978902 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:36:05.990683 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 20:36:05.990728 systemd[1]: Stopped ignition-fetch.service. Oct 2 20:36:05.999033 systemd[1]: Stopped target network.target. Oct 2 20:36:06.007880 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:36:06.007927 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:36:06.017719 systemd[1]: Stopped target paths.target. Oct 2 20:36:06.021725 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:36:06.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:06.025156 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:36:06.031512 systemd[1]: Stopped target slices.target. Oct 2 20:36:06.039541 systemd[1]: Stopped target sockets.target. Oct 2 20:36:06.047346 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:36:06.047400 systemd[1]: Closed iscsid.socket. Oct 2 20:36:06.054575 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:36:06.054606 systemd[1]: Closed iscsiuio.socket. Oct 2 20:36:06.065324 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:36:06.065369 systemd[1]: Stopped ignition-setup.service. Oct 2 20:36:06.074189 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:06.082338 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:36:06.090235 systemd-networkd[849]: eth0: DHCPv6 lease lost Oct 2 20:36:06.502000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:36:06.502888 iscsid[854]: iscsid shutting down. Oct 2 20:36:06.092728 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:36:06.093252 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:36:06.093357 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:36:06.101831 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:36:06.101924 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:36:06.110878 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:06.110958 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:06.503152 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Oct 2 20:36:06.118836 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:36:06.118868 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:36:06.127586 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:36:06.127626 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:36:06.136476 systemd[1]: Stopping network-cleanup.service... Oct 2 20:36:06.145392 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:36:06.145452 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:36:06.150314 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:36:06.150355 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:36:06.167239 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:36:06.167288 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:36:06.172739 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:36:06.183774 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:36:06.188072 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:36:06.188245 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:36:06.195798 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:36:06.195864 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:36:06.204396 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:36:06.204434 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:36:06.213566 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:36:06.213623 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:36:06.222247 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:36:06.222292 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:36:06.231254 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:36:06.231302 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:36:06.245353 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:36:06.264248 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:36:06.264329 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:36:06.284950 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:36:06.285052 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:36:06.423812 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:36:06.423925 systemd[1]: Stopped network-cleanup.service. Oct 2 20:36:06.431722 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:36:06.442776 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:36:06.461852 systemd[1]: Switching root. Oct 2 20:36:06.503988 systemd-journald[276]: Journal stopped Oct 2 20:36:17.256016 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:36:17.256036 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:36:17.256046 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:36:17.256057 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:36:17.256064 kernel: SELinux: policy capability open_perms=1 Oct 2 20:36:17.256072 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:36:17.256081 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:36:17.256088 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:36:17.256096 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:36:17.256104 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:36:17.256113 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:36:17.256122 systemd[1]: Successfully loaded SELinux policy in 240.136ms. Oct 2 20:36:17.256141 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.131ms. Oct 2 20:36:17.256153 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:36:17.256164 systemd[1]: Detected virtualization microsoft. Oct 2 20:36:17.256173 systemd[1]: Detected architecture arm64. Oct 2 20:36:17.256182 systemd[1]: Detected first boot. Oct 2 20:36:17.256191 systemd[1]: Hostname set to . Oct 2 20:36:17.256199 systemd[1]: Initializing machine ID from random generator. Oct 2 20:36:17.256208 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:36:17.256220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:36:17.256229 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:36:17.256241 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:36:17.256250 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 20:36:17.256258 kernel: audit: type=1334 audit(1696278976.059:86): prog-id=12 op=LOAD Oct 2 20:36:17.256266 kernel: audit: type=1334 audit(1696278976.059:87): prog-id=3 op=UNLOAD Oct 2 20:36:17.256275 kernel: audit: type=1334 audit(1696278976.065:88): prog-id=13 op=LOAD Oct 2 20:36:17.256283 kernel: audit: type=1334 audit(1696278976.070:89): prog-id=14 op=LOAD Oct 2 20:36:17.256291 kernel: audit: type=1334 audit(1696278976.070:90): prog-id=4 op=UNLOAD Oct 2 20:36:17.256301 kernel: audit: type=1334 audit(1696278976.070:91): prog-id=5 op=UNLOAD Oct 2 20:36:17.256309 kernel: audit: type=1334 audit(1696278976.076:92): prog-id=15 op=LOAD Oct 2 20:36:17.256317 kernel: audit: type=1334 audit(1696278976.076:93): prog-id=12 op=UNLOAD Oct 2 20:36:17.256326 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:36:17.256335 kernel: audit: type=1334 audit(1696278976.081:94): prog-id=16 op=LOAD Oct 2 20:36:17.256343 systemd[1]: Stopped iscsiuio.service. Oct 2 20:36:17.256352 kernel: audit: type=1334 audit(1696278976.086:95): prog-id=17 op=LOAD Oct 2 20:36:17.256362 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:36:17.256371 systemd[1]: Stopped iscsid.service. Oct 2 20:36:17.256380 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:36:17.256390 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:36:17.256401 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:36:17.256411 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:36:17.256421 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:36:17.256430 systemd[1]: Created slice system-getty.slice. Oct 2 20:36:17.256439 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:36:17.256450 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:36:17.256460 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:36:17.256469 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:36:17.256478 systemd[1]: Created slice user.slice. Oct 2 20:36:17.256487 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:36:17.256496 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:36:17.256506 systemd[1]: Set up automount boot.automount. Oct 2 20:36:17.256515 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:36:17.256524 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:36:17.256534 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:36:17.256544 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:36:17.256553 systemd[1]: Reached target integritysetup.target. Oct 2 20:36:17.256562 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:36:17.256571 systemd[1]: Reached target remote-fs.target. Oct 2 20:36:17.256580 systemd[1]: Reached target slices.target. Oct 2 20:36:17.256589 systemd[1]: Reached target swap.target. Oct 2 20:36:17.256598 systemd[1]: Reached target torcx.target. Oct 2 20:36:17.256610 systemd[1]: Reached target veritysetup.target. Oct 2 20:36:17.256620 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:36:17.256630 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:36:17.256639 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:36:17.256650 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:36:17.256659 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:36:17.256668 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:36:17.256678 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:36:17.256687 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:36:17.256696 systemd[1]: Mounting media.mount... Oct 2 20:36:17.256705 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:36:17.256714 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:36:17.256724 systemd[1]: Mounting tmp.mount... Oct 2 20:36:17.256733 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:36:17.256743 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:36:17.256753 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:36:17.256762 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:36:17.256771 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:36:17.256780 systemd[1]: Starting modprobe@drm.service... Oct 2 20:36:17.256789 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:36:17.256799 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:36:17.256809 systemd[1]: Starting modprobe@loop.service... Oct 2 20:36:17.256820 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:36:17.256829 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:36:17.256839 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:36:17.256848 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:36:17.256857 kernel: fuse: init (API version 7.34) Oct 2 20:36:17.256866 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:36:17.256875 systemd[1]: Stopped systemd-journald.service. Oct 2 20:36:17.256884 systemd[1]: systemd-journald.service: Consumed 2.943s CPU time. Oct 2 20:36:17.256893 kernel: loop: module loaded Oct 2 20:36:17.256903 systemd[1]: Starting systemd-journald.service... Oct 2 20:36:17.256913 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:36:17.256922 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:36:17.256932 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:36:17.256941 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:36:17.256950 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:36:17.256959 systemd[1]: Stopped verity-setup.service. Oct 2 20:36:17.256968 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:36:17.257085 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:36:17.257106 systemd[1]: Mounted media.mount. Oct 2 20:36:17.257116 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:36:17.257125 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:36:17.257144 systemd[1]: Mounted tmp.mount. Oct 2 20:36:17.257158 systemd-journald[1181]: Journal started Oct 2 20:36:17.257292 systemd-journald[1181]: Runtime Journal (/run/log/journal/74a0ff744e4644a38d18a1ad65d2777a) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:36:08.508000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:36:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:09.145000 audit: BPF prog-id=10 op=LOAD Oct 2 20:36:09.145000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:36:09.145000 audit: BPF prog-id=11 op=LOAD Oct 2 20:36:09.145000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:36:16.059000 audit: BPF prog-id=12 op=LOAD Oct 2 20:36:16.059000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:36:16.065000 audit: BPF prog-id=13 op=LOAD Oct 2 20:36:16.070000 audit: BPF prog-id=14 op=LOAD Oct 2 20:36:16.070000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:36:16.070000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:36:16.076000 audit: BPF prog-id=15 op=LOAD Oct 2 20:36:16.076000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:36:16.081000 audit: BPF prog-id=16 op=LOAD Oct 2 20:36:16.086000 audit: BPF prog-id=17 op=LOAD Oct 2 20:36:16.086000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:36:16.086000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:36:16.091000 audit: BPF prog-id=18 op=LOAD Oct 2 20:36:16.091000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:36:16.097000 audit: BPF prog-id=19 op=LOAD Oct 2 20:36:16.102000 audit: BPF prog-id=20 op=LOAD Oct 2 20:36:16.102000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:36:16.102000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:36:16.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.127000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:36:16.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.111000 audit: BPF prog-id=21 op=LOAD Oct 2 20:36:17.112000 audit: BPF prog-id=22 op=LOAD Oct 2 20:36:17.112000 audit: BPF prog-id=23 op=LOAD Oct 2 20:36:17.112000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:36:17.112000 audit: BPF prog-id=20 op=UNLOAD Oct 2 20:36:17.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.253000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:36:17.253000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffdd0f2800 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:17.253000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:36:10.236535 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:36:16.058082 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:36:10.290710 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:16.103070 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:36:10.290737 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:16.103644 systemd[1]: systemd-journald.service: Consumed 2.943s CPU time. Oct 2 20:36:10.290775 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:36:10.290785 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:36:10.290816 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:36:10.290829 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:36:10.291021 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:36:10.291052 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:10.291064 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:10.291400 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:36:10.291433 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:36:10.291451 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:36:10.291464 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:36:10.291480 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:36:10.291493 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:36:15.215028 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:15.215307 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:15.215398 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:15.215545 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:15.215591 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:36:15.215646 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:36:17.268016 systemd[1]: Started systemd-journald.service. Oct 2 20:36:17.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.268967 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:36:17.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.273865 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:36:17.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.282528 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:36:17.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.282685 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:36:17.287635 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:36:17.287979 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:36:17.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.292832 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:36:17.292986 systemd[1]: Finished modprobe@drm.service. Oct 2 20:36:17.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.297719 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:36:17.297872 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:36:17.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.302738 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:36:17.302870 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:36:17.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.307864 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:36:17.307984 systemd[1]: Finished modprobe@loop.service. Oct 2 20:36:17.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.313045 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:36:17.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.318651 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:36:17.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.323935 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:36:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.328631 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:36:17.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.333631 systemd[1]: Reached target network-pre.target. Oct 2 20:36:17.339518 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:36:17.345262 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:36:17.349087 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:36:17.379055 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:36:17.384612 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:36:17.389083 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:36:17.390179 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:36:17.394560 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:36:17.395615 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:36:17.400708 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:36:17.406257 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:36:17.412941 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:36:17.418060 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:36:17.424138 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 20:36:17.447064 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:36:17.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.452372 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:36:17.466621 systemd-journald[1181]: Time spent on flushing to /var/log/journal/74a0ff744e4644a38d18a1ad65d2777a is 15.916ms for 1105 entries. Oct 2 20:36:17.466621 systemd-journald[1181]: System Journal (/var/log/journal/74a0ff744e4644a38d18a1ad65d2777a) is 8.0M, max 2.6G, 2.6G free. Oct 2 20:36:17.522686 systemd-journald[1181]: Received client request to flush runtime journal. Oct 2 20:36:17.519517 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:36:17.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.524703 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:36:17.901731 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:36:17.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.467188 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:36:18.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.472000 audit: BPF prog-id=24 op=LOAD Oct 2 20:36:18.472000 audit: BPF prog-id=25 op=LOAD Oct 2 20:36:18.472000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:36:18.472000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:36:18.473696 systemd[1]: Starting systemd-udevd.service... Oct 2 20:36:18.494243 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Oct 2 20:36:18.614803 systemd[1]: Started systemd-udevd.service. Oct 2 20:36:18.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.624000 audit: BPF prog-id=26 op=LOAD Oct 2 20:36:18.626799 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:18.676000 audit: BPF prog-id=27 op=LOAD Oct 2 20:36:18.676000 audit: BPF prog-id=28 op=LOAD Oct 2 20:36:18.676000 audit: BPF prog-id=29 op=LOAD Oct 2 20:36:18.677383 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:36:18.683743 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 20:36:18.744275 systemd[1]: Started systemd-userdbd.service. Oct 2 20:36:18.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.751184 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:36:18.752000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:36:18.761154 kernel: hv_vmbus: registering driver hv_balloon Oct 2 20:36:18.761241 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 20:36:18.774353 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 20:36:18.774435 kernel: hv_balloon: Memory hot add disabled on ARM64 Oct 2 20:36:18.794567 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 20:36:18.794642 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 20:36:18.801942 kernel: Console: switching to colour dummy device 80x25 Oct 2 20:36:18.808930 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:36:18.752000 audit[1206]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae5f86ba0 a1=aa2c a2=ffff94a724b0 a3=aaaae5ee5010 items=10 ppid=1198 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:18.752000 audit: CWD cwd="/" Oct 2 20:36:18.752000 audit: PATH item=0 name=(null) inode=11339 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=1 name=(null) inode=11340 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=2 name=(null) inode=11339 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=3 name=(null) inode=11341 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=4 name=(null) inode=11339 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=5 name=(null) inode=11342 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=6 name=(null) inode=11339 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=7 name=(null) inode=11343 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=8 name=(null) inode=11339 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PATH item=9 name=(null) inode=11344 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.752000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:36:18.840293 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 20:36:18.840361 kernel: hv_vmbus: registering driver hv_utils Oct 2 20:36:18.844064 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 20:36:18.858320 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 20:36:18.858389 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 20:36:18.857211 systemd-networkd[1219]: lo: Link UP Oct 2 20:36:18.921090 systemd-journald[1181]: Time jumped backwards, rotating. Oct 2 20:36:18.921162 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1208) Oct 2 20:36:18.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.857223 systemd-networkd[1219]: lo: Gained carrier Oct 2 20:36:18.857623 systemd-networkd[1219]: Enumeration completed Oct 2 20:36:18.857719 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:18.868704 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:18.888119 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:18.942300 kernel: mlx5_core 84b2:00:02.0 enP33970s1: Link up Oct 2 20:36:18.949559 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:36:18.955211 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:36:18.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.961567 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:36:19.032557 kernel: hv_netvsc 000d3a6e-af02-000d-3a6e-af02000d3a6e eth0: Data path switched to VF: enP33970s1 Oct 2 20:36:19.032808 systemd-networkd[1219]: enP33970s1: Link UP Oct 2 20:36:19.032974 systemd-networkd[1219]: eth0: Link UP Oct 2 20:36:19.033048 systemd-networkd[1219]: eth0: Gained carrier Oct 2 20:36:19.037537 systemd-networkd[1219]: enP33970s1: Gained carrier Oct 2 20:36:19.051390 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:19.245003 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.284352 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:36:19.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.289506 systemd[1]: Reached target cryptsetup.target. Oct 2 20:36:19.295429 systemd[1]: Starting lvm2-activation.service... Oct 2 20:36:19.301831 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.324334 systemd[1]: Finished lvm2-activation.service. Oct 2 20:36:19.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.328892 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:36:19.333632 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:36:19.333659 systemd[1]: Reached target local-fs.target. Oct 2 20:36:19.338126 systemd[1]: Reached target machines.target. Oct 2 20:36:19.343670 systemd[1]: Starting ldconfig.service... Oct 2 20:36:19.347441 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.347507 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:19.348962 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:36:19.354095 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:36:19.361133 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:36:19.365813 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.365862 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.366854 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:36:19.391002 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1279 (bootctl) Oct 2 20:36:19.392136 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:36:19.764225 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:36:19.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.074698 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:36:20.111184 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:36:20.112933 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:36:20.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.162639 systemd-fsck[1287]: fsck.fat 4.2 (2021-01-31) Oct 2 20:36:20.162639 systemd-fsck[1287]: /dev/sda1: 236 files, 113463/258078 clusters Oct 2 20:36:20.167583 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:36:20.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.175492 systemd[1]: Mounting boot.mount... Oct 2 20:36:20.179234 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:36:20.188407 systemd[1]: Mounted boot.mount. Oct 2 20:36:20.199429 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:36:20.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.296396 systemd-networkd[1219]: eth0: Gained IPv6LL Oct 2 20:36:20.297990 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:36:20.301663 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:20.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.863627 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:36:20.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.870313 systemd[1]: Starting audit-rules.service... Oct 2 20:36:20.876005 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:36:20.882173 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:36:20.887000 audit: BPF prog-id=30 op=LOAD Oct 2 20:36:20.889318 systemd[1]: Starting systemd-resolved.service... Oct 2 20:36:20.896000 audit: BPF prog-id=31 op=LOAD Oct 2 20:36:20.898498 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:36:20.903882 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:36:20.973304 kernel: kauditd_printk_skb: 87 callbacks suppressed Oct 2 20:36:20.973396 kernel: audit: type=1127 audit(1696278980.945:168): pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.945000 audit[1299]: SYSTEM_BOOT pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.946648 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:36:20.974436 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:36:20.976088 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:36:21.003157 kernel: audit: type=1130 audit(1696278980.971:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.027342 kernel: audit: type=1130 audit(1696278981.007:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.049796 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:36:21.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.054994 systemd[1]: Reached target time-set.target. Oct 2 20:36:21.076287 kernel: audit: type=1130 audit(1696278981.053:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.079638 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:36:21.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.103316 kernel: audit: type=1130 audit(1696278981.083:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.157510 systemd-resolved[1296]: Positive Trust Anchors: Oct 2 20:36:21.157964 systemd-resolved[1296]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:36:21.158048 systemd-resolved[1296]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:36:21.222207 systemd-resolved[1296]: Using system hostname 'ci-3510.3.0-a-f31f601c03'. Oct 2 20:36:21.224233 systemd[1]: Started systemd-resolved.service. Oct 2 20:36:21.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.229212 systemd[1]: Reached target network.target. Oct 2 20:36:21.250443 kernel: audit: type=1130 audit(1696278981.227:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.250811 systemd[1]: Reached target network-online.target. Oct 2 20:36:21.255375 systemd[1]: Reached target nss-lookup.target. Oct 2 20:36:21.293000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:36:21.293000 audit[1314]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdacf7c50 a2=420 a3=0 items=0 ppid=1293 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:21.334025 kernel: audit: type=1305 audit(1696278981.293:174): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:36:21.334116 kernel: audit: type=1300 audit(1696278981.293:174): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdacf7c50 a2=420 a3=0 items=0 ppid=1293 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:21.293000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:36:21.345828 kernel: audit: type=1327 audit(1696278981.293:174): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:36:21.346114 augenrules[1314]: No rules Oct 2 20:36:21.347255 systemd[1]: Finished audit-rules.service. Oct 2 20:36:21.368235 systemd-timesyncd[1298]: Contacted time server 45.79.214.107:123 (0.flatcar.pool.ntp.org). Oct 2 20:36:21.368328 systemd-timesyncd[1298]: Initial clock synchronization to Mon 2023-10-02 20:36:21.360748 UTC. Oct 2 20:36:27.600012 ldconfig[1278]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:36:27.613566 systemd[1]: Finished ldconfig.service. Oct 2 20:36:27.619436 systemd[1]: Starting systemd-update-done.service... Oct 2 20:36:27.644136 systemd[1]: Finished systemd-update-done.service. Oct 2 20:36:27.648841 systemd[1]: Reached target sysinit.target. Oct 2 20:36:27.653146 systemd[1]: Started motdgen.path. Oct 2 20:36:27.657129 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:36:27.663260 systemd[1]: Started logrotate.timer. Oct 2 20:36:27.667036 systemd[1]: Started mdadm.timer. Oct 2 20:36:27.670619 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:36:27.675098 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:36:27.675131 systemd[1]: Reached target paths.target. Oct 2 20:36:27.679028 systemd[1]: Reached target timers.target. Oct 2 20:36:27.683683 systemd[1]: Listening on dbus.socket. Oct 2 20:36:27.688623 systemd[1]: Starting docker.socket... Oct 2 20:36:27.695128 systemd[1]: Listening on sshd.socket. Oct 2 20:36:27.699115 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.699593 systemd[1]: Listening on docker.socket. Oct 2 20:36:27.703887 systemd[1]: Reached target sockets.target. Oct 2 20:36:27.707981 systemd[1]: Reached target basic.target. Oct 2 20:36:27.711975 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.712003 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.713462 systemd[1]: Starting containerd.service... Oct 2 20:36:27.718051 systemd[1]: Starting dbus.service... Oct 2 20:36:27.722323 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:36:27.727551 systemd[1]: Starting extend-filesystems.service... Oct 2 20:36:27.734459 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:36:27.736519 systemd[1]: Starting motdgen.service... Oct 2 20:36:27.741035 systemd[1]: Started nvidia.service. Oct 2 20:36:27.746458 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:36:27.751811 systemd[1]: Starting prepare-critools.service... Oct 2 20:36:27.756932 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:36:27.762228 systemd[1]: Starting sshd-keygen.service... Oct 2 20:36:27.772661 systemd[1]: Starting systemd-logind.service... Oct 2 20:36:27.777573 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.777628 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 20:36:27.778018 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:36:27.778675 systemd[1]: Starting update-engine.service... Oct 2 20:36:27.783715 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:36:27.794134 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:36:27.794330 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:36:27.803465 jq[1324]: false Oct 2 20:36:27.805894 jq[1342]: true Oct 2 20:36:27.819949 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:36:27.820112 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:36:27.838773 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:36:27.838955 systemd[1]: Finished motdgen.service. Oct 2 20:36:27.845111 extend-filesystems[1325]: Found sda Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda1 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda2 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda3 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found usr Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda4 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda6 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda7 Oct 2 20:36:27.848964 extend-filesystems[1325]: Found sda9 Oct 2 20:36:27.848964 extend-filesystems[1325]: Checking size of /dev/sda9 Oct 2 20:36:27.891936 jq[1347]: true Oct 2 20:36:27.896593 systemd-logind[1338]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 20:36:27.902744 systemd-logind[1338]: New seat seat0. Oct 2 20:36:27.933783 env[1352]: time="2023-10-02T20:36:27.933683415Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:36:27.937042 tar[1345]: ./ Oct 2 20:36:27.937042 tar[1345]: ./macvlan Oct 2 20:36:27.943363 tar[1346]: crictl Oct 2 20:36:27.944189 extend-filesystems[1325]: Old size kept for /dev/sda9 Oct 2 20:36:27.955389 extend-filesystems[1325]: Found sr0 Oct 2 20:36:27.949727 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:36:27.949885 systemd[1]: Finished extend-filesystems.service. Oct 2 20:36:28.011721 env[1352]: time="2023-10-02T20:36:28.011678641Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:36:28.016348 env[1352]: time="2023-10-02T20:36:28.016310675Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.024554 dbus-daemon[1323]: [system] SELinux support is enabled Oct 2 20:36:28.030898 dbus-daemon[1323]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 20:36:28.024713 systemd[1]: Started dbus.service. Oct 2 20:36:28.030312 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:36:28.030372 systemd[1]: Reached target system-config.target. Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.035857613Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.035898760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.036124369Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.036141724Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.036155080Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.036167036Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036767 env[1352]: time="2023-10-02T20:36:28.036239653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.036967 bash[1387]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:36:28.037622 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:36:28.037641 systemd[1]: Reached target user-config.target. Oct 2 20:36:28.043419 env[1352]: time="2023-10-02T20:36:28.043390661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.043661 env[1352]: time="2023-10-02T20:36:28.043642782Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.043737 env[1352]: time="2023-10-02T20:36:28.043723637Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:36:28.043847 env[1352]: time="2023-10-02T20:36:28.043830244Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:36:28.043912 env[1352]: time="2023-10-02T20:36:28.043899782Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:36:28.044930 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:36:28.051169 systemd[1]: Started systemd-logind.service. Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064187289Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064231475Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064244671Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064295295Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064313010Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064326205Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064338921Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064699609Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064719443Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064733838Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064745994Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064759790Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064881352Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:36:28.065625 env[1352]: time="2023-10-02T20:36:28.064951890Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065231923Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065256875Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065283107Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065351445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065364481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065376398Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065387274Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065398311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065410147Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065427622Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065439858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065453094Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065563499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065580854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.065934 env[1352]: time="2023-10-02T20:36:28.065594090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.067243 env[1352]: time="2023-10-02T20:36:28.065605686Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:36:28.067243 env[1352]: time="2023-10-02T20:36:28.066235729Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:36:28.067243 env[1352]: time="2023-10-02T20:36:28.066248925Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.067243 env[1352]: time="2023-10-02T20:36:28.066280155Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:36:28.067243 env[1352]: time="2023-10-02T20:36:28.066317544Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.067408 tar[1345]: ./static Oct 2 20:36:28.067469 env[1352]: time="2023-10-02T20:36:28.066534716Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:36:28.067469 env[1352]: time="2023-10-02T20:36:28.066585420Z" level=info msg="Connect containerd service" Oct 2 20:36:28.067469 env[1352]: time="2023-10-02T20:36:28.066659397Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.068072076Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.068494824Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.068595753Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.074775863Z" level=info msg="Start subscribing containerd event" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.074984798Z" level=info msg="Start recovering state" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.075057695Z" level=info msg="Start event monitor" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.075127474Z" level=info msg="Start snapshots syncer" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.075140030Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:36:28.083042 env[1352]: time="2023-10-02T20:36:28.075151026Z" level=info msg="Start streaming server" Oct 2 20:36:28.068694 systemd[1]: Started containerd.service. Oct 2 20:36:28.075549 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 20:36:28.085437 env[1352]: time="2023-10-02T20:36:28.083481985Z" level=info msg="containerd successfully booted in 0.150179s" Oct 2 20:36:28.140709 tar[1345]: ./vlan Oct 2 20:36:28.232538 tar[1345]: ./portmap Oct 2 20:36:28.293500 tar[1345]: ./host-local Oct 2 20:36:28.339293 tar[1345]: ./vrf Oct 2 20:36:28.339600 systemd[1]: Finished prepare-critools.service. Oct 2 20:36:28.373440 tar[1345]: ./bridge Oct 2 20:36:28.406077 tar[1345]: ./tuning Oct 2 20:36:28.433500 tar[1345]: ./firewall Oct 2 20:36:28.467953 tar[1345]: ./host-device Oct 2 20:36:28.498384 update_engine[1340]: I1002 20:36:28.484975 1340 main.cc:92] Flatcar Update Engine starting Oct 2 20:36:28.498686 tar[1345]: ./sbr Oct 2 20:36:28.526340 tar[1345]: ./loopback Oct 2 20:36:28.548409 systemd[1]: Started update-engine.service. Oct 2 20:36:28.554539 tar[1345]: ./dhcp Oct 2 20:36:28.554575 update_engine[1340]: I1002 20:36:28.548437 1340 update_check_scheduler.cc:74] Next update check in 7m33s Oct 2 20:36:28.556565 systemd[1]: Started locksmithd.service. Oct 2 20:36:28.630562 tar[1345]: ./ptp Oct 2 20:36:28.662535 tar[1345]: ./ipvlan Oct 2 20:36:28.693754 tar[1345]: ./bandwidth Oct 2 20:36:28.764350 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:36:29.825126 locksmithd[1423]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:36:29.969696 sshd_keygen[1343]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:36:29.994910 systemd[1]: Finished sshd-keygen.service. Oct 2 20:36:30.001468 systemd[1]: Starting issuegen.service... Oct 2 20:36:30.009327 systemd[1]: Started waagent.service. Oct 2 20:36:30.014692 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:36:30.014849 systemd[1]: Finished issuegen.service. Oct 2 20:36:30.020739 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:36:30.046075 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:36:30.052154 systemd[1]: Started getty@tty1.service. Oct 2 20:36:30.058371 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 20:36:30.063067 systemd[1]: Reached target getty.target. Oct 2 20:36:30.067171 systemd[1]: Reached target multi-user.target. Oct 2 20:36:30.072824 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:36:30.089558 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:36:30.089719 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:36:30.095453 systemd[1]: Startup finished in 729ms (kernel) + 19.474s (initrd) + 22.137s (userspace) = 42.342s. Oct 2 20:36:30.666373 login[1444]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 20:36:30.679949 login[1443]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:30.758357 systemd[1]: Created slice user-500.slice. Oct 2 20:36:30.759488 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:36:30.762381 systemd-logind[1338]: New session 1 of user core. Oct 2 20:36:30.810730 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:36:30.812493 systemd[1]: Starting user@500.service... Oct 2 20:36:30.845650 (systemd)[1447]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:36:31.082147 systemd[1447]: Queued start job for default target default.target. Oct 2 20:36:31.082687 systemd[1447]: Reached target paths.target. Oct 2 20:36:31.082708 systemd[1447]: Reached target sockets.target. Oct 2 20:36:31.082719 systemd[1447]: Reached target timers.target. Oct 2 20:36:31.082729 systemd[1447]: Reached target basic.target. Oct 2 20:36:31.082831 systemd[1]: Started user@500.service. Oct 2 20:36:31.083713 systemd[1]: Started session-1.scope. Oct 2 20:36:31.084158 systemd[1447]: Reached target default.target. Oct 2 20:36:31.084347 systemd[1447]: Startup finished in 230ms. Oct 2 20:36:31.667768 login[1444]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:31.672333 systemd-logind[1338]: New session 2 of user core. Oct 2 20:36:31.672425 systemd[1]: Started session-2.scope. Oct 2 20:36:35.678055 waagent[1438]: 2023-10-02T20:36:35.677937Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 20:36:35.684445 waagent[1438]: 2023-10-02T20:36:35.684375Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 20:36:35.688952 waagent[1438]: 2023-10-02T20:36:35.688897Z INFO Daemon Daemon Python: 3.9.16 Oct 2 20:36:35.693774 waagent[1438]: 2023-10-02T20:36:35.693387Z INFO Daemon Daemon Run daemon Oct 2 20:36:35.697706 waagent[1438]: 2023-10-02T20:36:35.697645Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 20:36:35.717200 waagent[1438]: 2023-10-02T20:36:35.717079Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:35.732543 waagent[1438]: 2023-10-02T20:36:35.732427Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:35.742310 waagent[1438]: 2023-10-02T20:36:35.742223Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:35.747418 waagent[1438]: 2023-10-02T20:36:35.747354Z INFO Daemon Daemon Using waagent for provisioning Oct 2 20:36:35.753515 waagent[1438]: 2023-10-02T20:36:35.753455Z INFO Daemon Daemon Activate resource disk Oct 2 20:36:35.758404 waagent[1438]: 2023-10-02T20:36:35.758345Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 20:36:35.772844 waagent[1438]: 2023-10-02T20:36:35.772763Z INFO Daemon Daemon Found device: None Oct 2 20:36:35.777725 waagent[1438]: 2023-10-02T20:36:35.777651Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 20:36:35.786671 waagent[1438]: 2023-10-02T20:36:35.786600Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 20:36:35.799180 waagent[1438]: 2023-10-02T20:36:35.799109Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:35.805337 waagent[1438]: 2023-10-02T20:36:35.805248Z INFO Daemon Daemon Running default provisioning handler Oct 2 20:36:35.821505 waagent[1438]: 2023-10-02T20:36:35.821374Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:35.837308 waagent[1438]: 2023-10-02T20:36:35.837151Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:35.847446 waagent[1438]: 2023-10-02T20:36:35.847361Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:35.853532 waagent[1438]: 2023-10-02T20:36:35.853460Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 20:36:35.960674 waagent[1438]: 2023-10-02T20:36:35.959678Z INFO Daemon Daemon Successfully mounted dvd Oct 2 20:36:36.071441 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 20:36:36.103993 waagent[1438]: 2023-10-02T20:36:36.103838Z INFO Daemon Daemon Detect protocol endpoint Oct 2 20:36:36.109123 waagent[1438]: 2023-10-02T20:36:36.109049Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:36.115066 waagent[1438]: 2023-10-02T20:36:36.115000Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 20:36:36.121675 waagent[1438]: 2023-10-02T20:36:36.121615Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 20:36:36.127086 waagent[1438]: 2023-10-02T20:36:36.127028Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 20:36:36.132351 waagent[1438]: 2023-10-02T20:36:36.132294Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 20:36:36.271084 waagent[1438]: 2023-10-02T20:36:36.270963Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 20:36:36.278225 waagent[1438]: 2023-10-02T20:36:36.278180Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 20:36:36.283712 waagent[1438]: 2023-10-02T20:36:36.283656Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 20:36:36.983170 waagent[1438]: 2023-10-02T20:36:36.983027Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 20:36:36.998050 waagent[1438]: 2023-10-02T20:36:36.997968Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 20:36:37.004157 waagent[1438]: 2023-10-02T20:36:37.004085Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 20:36:37.088860 waagent[1438]: 2023-10-02T20:36:37.088728Z INFO Daemon Daemon Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:37.097827 waagent[1438]: 2023-10-02T20:36:37.097747Z INFO Daemon Daemon Certificate with thumbprint BD7B9F6C501571C0B25BFC41FCCF95EA4ED331E8 has no matching private key. Oct 2 20:36:37.107848 waagent[1438]: 2023-10-02T20:36:37.107775Z INFO Daemon Daemon Fetch goal state completed Oct 2 20:36:37.156639 waagent[1438]: 2023-10-02T20:36:37.156580Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 0c18ec1f-d11c-4def-9f0d-3a8f93e6ea19 New eTag: 1904118544210459623] Oct 2 20:36:37.167418 waagent[1438]: 2023-10-02T20:36:37.167350Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:37.181725 waagent[1438]: 2023-10-02T20:36:37.181663Z INFO Daemon Daemon Starting provisioning Oct 2 20:36:37.186989 waagent[1438]: 2023-10-02T20:36:37.186928Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 20:36:37.192017 waagent[1438]: 2023-10-02T20:36:37.191962Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-f31f601c03] Oct 2 20:36:37.245324 waagent[1438]: 2023-10-02T20:36:37.245181Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-f31f601c03] Oct 2 20:36:37.252204 waagent[1438]: 2023-10-02T20:36:37.252129Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 20:36:37.258659 waagent[1438]: 2023-10-02T20:36:37.258599Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 20:36:37.278210 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 20:36:37.278417 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 20:36:37.278473 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 20:36:37.278707 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:37.284321 systemd-networkd[1219]: eth0: DHCPv6 lease lost Oct 2 20:36:37.285918 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:37.286086 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:37.287984 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:37.320668 systemd-networkd[1494]: enP33970s1: Link UP Oct 2 20:36:37.320680 systemd-networkd[1494]: enP33970s1: Gained carrier Oct 2 20:36:37.321615 systemd-networkd[1494]: eth0: Link UP Oct 2 20:36:37.321626 systemd-networkd[1494]: eth0: Gained carrier Oct 2 20:36:37.321940 systemd-networkd[1494]: lo: Link UP Oct 2 20:36:37.321956 systemd-networkd[1494]: lo: Gained carrier Oct 2 20:36:37.322174 systemd-networkd[1494]: eth0: Gained IPv6LL Oct 2 20:36:37.323248 systemd-networkd[1494]: Enumeration completed Oct 2 20:36:37.323580 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:37.325172 systemd-networkd[1494]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:37.325316 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:37.328132 waagent[1438]: 2023-10-02T20:36:37.327811Z INFO Daemon Daemon Create user account if not exists Oct 2 20:36:37.334259 waagent[1438]: 2023-10-02T20:36:37.334182Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 20:36:37.342821 waagent[1438]: 2023-10-02T20:36:37.342730Z INFO Daemon Daemon Configure sudoer Oct 2 20:36:37.348176 waagent[1438]: 2023-10-02T20:36:37.348100Z INFO Daemon Daemon Configure sshd Oct 2 20:36:37.348401 systemd-networkd[1494]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:37.354600 waagent[1438]: 2023-10-02T20:36:37.354528Z INFO Daemon Daemon Deploy ssh public key. Oct 2 20:36:37.355549 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:38.581446 waagent[1438]: 2023-10-02T20:36:38.581376Z INFO Daemon Daemon Provisioning complete Oct 2 20:36:38.604219 waagent[1438]: 2023-10-02T20:36:38.604152Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 20:36:38.611231 waagent[1438]: 2023-10-02T20:36:38.611154Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 20:36:38.622595 waagent[1438]: 2023-10-02T20:36:38.622517Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 20:36:38.924678 waagent[1503]: 2023-10-02T20:36:38.924583Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 20:36:38.925475 waagent[1503]: 2023-10-02T20:36:38.925416Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:38.925612 waagent[1503]: 2023-10-02T20:36:38.925567Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:38.937713 waagent[1503]: 2023-10-02T20:36:38.937638Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 20:36:38.937898 waagent[1503]: 2023-10-02T20:36:38.937849Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 20:36:39.015744 waagent[1503]: 2023-10-02T20:36:39.015602Z INFO ExtHandler ExtHandler Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:39.015956 waagent[1503]: 2023-10-02T20:36:39.015905Z INFO ExtHandler ExtHandler Certificate with thumbprint BD7B9F6C501571C0B25BFC41FCCF95EA4ED331E8 has no matching private key. Oct 2 20:36:39.016176 waagent[1503]: 2023-10-02T20:36:39.016130Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 20:36:39.028200 waagent[1503]: 2023-10-02T20:36:39.028146Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 280c2739-424c-4ad4-ba38-20871873707f New eTag: 1904118544210459623] Oct 2 20:36:39.028840 waagent[1503]: 2023-10-02T20:36:39.028782Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:39.147335 waagent[1503]: 2023-10-02T20:36:39.147172Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:39.157270 waagent[1503]: 2023-10-02T20:36:39.157183Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1503 Oct 2 20:36:39.160967 waagent[1503]: 2023-10-02T20:36:39.160905Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:39.162299 waagent[1503]: 2023-10-02T20:36:39.162228Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:39.272604 waagent[1503]: 2023-10-02T20:36:39.272483Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:39.273004 waagent[1503]: 2023-10-02T20:36:39.272943Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:39.283684 waagent[1503]: 2023-10-02T20:36:39.283618Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:39.284213 waagent[1503]: 2023-10-02T20:36:39.284157Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:39.285412 waagent[1503]: 2023-10-02T20:36:39.285351Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 20:36:39.286744 waagent[1503]: 2023-10-02T20:36:39.286673Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:39.287649 waagent[1503]: 2023-10-02T20:36:39.287556Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:39.288042 waagent[1503]: 2023-10-02T20:36:39.287982Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:39.288321 waagent[1503]: 2023-10-02T20:36:39.288244Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:39.288568 waagent[1503]: 2023-10-02T20:36:39.288521Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:39.288781 waagent[1503]: 2023-10-02T20:36:39.288736Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:39.289417 waagent[1503]: 2023-10-02T20:36:39.289362Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:39.289907 waagent[1503]: 2023-10-02T20:36:39.289855Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:39.290125 waagent[1503]: 2023-10-02T20:36:39.290080Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:39.290431 waagent[1503]: 2023-10-02T20:36:39.290365Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:39.290661 waagent[1503]: 2023-10-02T20:36:39.290592Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:39.291627 waagent[1503]: 2023-10-02T20:36:39.291555Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:39.291627 waagent[1503]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:39.291627 waagent[1503]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:39.291627 waagent[1503]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:39.291627 waagent[1503]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:39.291627 waagent[1503]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:39.291627 waagent[1503]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:39.291914 waagent[1503]: 2023-10-02T20:36:39.291864Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:39.292496 waagent[1503]: 2023-10-02T20:36:39.292427Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:39.292839 waagent[1503]: 2023-10-02T20:36:39.292781Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:39.293110 waagent[1503]: 2023-10-02T20:36:39.293059Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:39.307869 waagent[1503]: 2023-10-02T20:36:39.307798Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 20:36:39.308745 waagent[1503]: 2023-10-02T20:36:39.308694Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:39.309820 waagent[1503]: 2023-10-02T20:36:39.309765Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 20:36:39.343180 waagent[1503]: 2023-10-02T20:36:39.343060Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1494' Oct 2 20:36:39.355079 waagent[1503]: 2023-10-02T20:36:39.355018Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 20:36:39.440958 waagent[1503]: 2023-10-02T20:36:39.440838Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:39.440958 waagent[1503]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:39.440958 waagent[1503]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:39.440958 waagent[1503]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:6e:af:02 brd ff:ff:ff:ff:ff:ff Oct 2 20:36:39.440958 waagent[1503]: 3: enP33970s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:6e:af:02 brd ff:ff:ff:ff:ff:ff\ altname enP33970p0s2 Oct 2 20:36:39.440958 waagent[1503]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:39.440958 waagent[1503]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:39.440958 waagent[1503]: 2: eth0 inet 10.200.20.37/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:39.440958 waagent[1503]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:39.440958 waagent[1503]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:39.440958 waagent[1503]: 2: eth0 inet6 fe80::20d:3aff:fe6e:af02/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:39.488773 waagent[1503]: 2023-10-02T20:36:39.488713Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Oct 2 20:36:39.626303 waagent[1438]: 2023-10-02T20:36:39.626178Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 20:36:39.630221 waagent[1438]: 2023-10-02T20:36:39.630173Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Oct 2 20:36:40.786379 waagent[1534]: 2023-10-02T20:36:40.786260Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Oct 2 20:36:40.787087 waagent[1534]: 2023-10-02T20:36:40.787017Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 20:36:40.787215 waagent[1534]: 2023-10-02T20:36:40.787168Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 20:36:40.797599 waagent[1534]: 2023-10-02T20:36:40.797440Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:40.798042 waagent[1534]: 2023-10-02T20:36:40.797987Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:40.798194 waagent[1534]: 2023-10-02T20:36:40.798147Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:40.811270 waagent[1534]: 2023-10-02T20:36:40.811185Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 20:36:40.819521 waagent[1534]: 2023-10-02T20:36:40.819462Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 20:36:40.820544 waagent[1534]: 2023-10-02T20:36:40.820485Z INFO ExtHandler Oct 2 20:36:40.820692 waagent[1534]: 2023-10-02T20:36:40.820645Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 14390ad9-e27e-488a-89d8-2aa89b2c639c eTag: 1904118544210459623 source: Fabric] Oct 2 20:36:40.821438 waagent[1534]: 2023-10-02T20:36:40.821378Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 20:36:40.822660 waagent[1534]: 2023-10-02T20:36:40.822599Z INFO ExtHandler Oct 2 20:36:40.822795 waagent[1534]: 2023-10-02T20:36:40.822748Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 20:36:40.828640 waagent[1534]: 2023-10-02T20:36:40.828593Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 20:36:40.829085 waagent[1534]: 2023-10-02T20:36:40.829035Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:40.846474 waagent[1534]: 2023-10-02T20:36:40.846414Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 20:36:40.929532 waagent[1534]: 2023-10-02T20:36:40.929370Z INFO ExtHandler Downloaded certificate {'thumbprint': 'BD7B9F6C501571C0B25BFC41FCCF95EA4ED331E8', 'hasPrivateKey': False} Oct 2 20:36:40.930593 waagent[1534]: 2023-10-02T20:36:40.930534Z INFO ExtHandler Downloaded certificate {'thumbprint': '96E73459C46BA3662DD73E07899B2530C5F3E5EB', 'hasPrivateKey': True} Oct 2 20:36:40.931629 waagent[1534]: 2023-10-02T20:36:40.931569Z INFO ExtHandler Fetch goal state completed Oct 2 20:36:40.956565 waagent[1534]: 2023-10-02T20:36:40.956499Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1534 Oct 2 20:36:40.960019 waagent[1534]: 2023-10-02T20:36:40.959959Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:40.961492 waagent[1534]: 2023-10-02T20:36:40.961436Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:40.967529 waagent[1534]: 2023-10-02T20:36:40.967464Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:40.967915 waagent[1534]: 2023-10-02T20:36:40.967855Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:40.978529 waagent[1534]: 2023-10-02T20:36:40.978467Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:40.979006 waagent[1534]: 2023-10-02T20:36:40.978948Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:40.986416 waagent[1534]: 2023-10-02T20:36:40.986261Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 20:36:40.990028 waagent[1534]: 2023-10-02T20:36:40.989967Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 20:36:40.991642 waagent[1534]: 2023-10-02T20:36:40.991568Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:40.992327 waagent[1534]: 2023-10-02T20:36:40.992240Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:40.992601 waagent[1534]: 2023-10-02T20:36:40.992549Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:40.993319 waagent[1534]: 2023-10-02T20:36:40.993239Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:40.993723 waagent[1534]: 2023-10-02T20:36:40.993670Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:40.993723 waagent[1534]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:40.993723 waagent[1534]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:40.993723 waagent[1534]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:40.993723 waagent[1534]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.993723 waagent[1534]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.993723 waagent[1534]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.996970 waagent[1534]: 2023-10-02T20:36:40.996862Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:40.997108 waagent[1534]: 2023-10-02T20:36:40.997029Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:40.998017 waagent[1534]: 2023-10-02T20:36:40.997938Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:40.999312 waagent[1534]: 2023-10-02T20:36:40.998610Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:41.001144 waagent[1534]: 2023-10-02T20:36:41.000985Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:41.001340 waagent[1534]: 2023-10-02T20:36:41.001256Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:41.001685 waagent[1534]: 2023-10-02T20:36:41.001603Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:41.002647 waagent[1534]: 2023-10-02T20:36:41.002533Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:41.005781 waagent[1534]: 2023-10-02T20:36:41.005583Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:41.005980 waagent[1534]: 2023-10-02T20:36:41.005902Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:41.010201 waagent[1534]: 2023-10-02T20:36:41.010027Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:41.025853 waagent[1534]: 2023-10-02T20:36:41.025774Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:41.025853 waagent[1534]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:41.025853 waagent[1534]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:41.025853 waagent[1534]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:6e:af:02 brd ff:ff:ff:ff:ff:ff Oct 2 20:36:41.025853 waagent[1534]: 3: enP33970s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:6e:af:02 brd ff:ff:ff:ff:ff:ff\ altname enP33970p0s2 Oct 2 20:36:41.025853 waagent[1534]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:41.025853 waagent[1534]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:41.025853 waagent[1534]: 2: eth0 inet 10.200.20.37/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:41.025853 waagent[1534]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:41.025853 waagent[1534]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:41.025853 waagent[1534]: 2: eth0 inet6 fe80::20d:3aff:fe6e:af02/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:41.032429 waagent[1534]: 2023-10-02T20:36:41.032341Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Oct 2 20:36:41.036119 waagent[1534]: 2023-10-02T20:36:41.036029Z INFO ExtHandler ExtHandler Downloading manifest Oct 2 20:36:41.056228 waagent[1534]: 2023-10-02T20:36:41.056129Z INFO ExtHandler ExtHandler Oct 2 20:36:41.056543 waagent[1534]: 2023-10-02T20:36:41.056486Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 34c859d7-a405-491b-b528-db844fe4d805 correlation b1d89bd9-d39a-452f-8abd-766ea9f573d8 created: 2023-10-02T20:35:06.941170Z] Oct 2 20:36:41.057509 waagent[1534]: 2023-10-02T20:36:41.057451Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 20:36:41.059429 waagent[1534]: 2023-10-02T20:36:41.059375Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Oct 2 20:36:41.077824 waagent[1534]: 2023-10-02T20:36:41.077759Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 20:36:41.104465 waagent[1534]: 2023-10-02T20:36:41.104367Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 648A9A0D-419A-44F2-AF54-59BEB26E5E9F;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 20:36:41.279361 waagent[1534]: 2023-10-02T20:36:41.279205Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 20:36:41.279361 waagent[1534]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.279361 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.279361 waagent[1534]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.279361 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.279361 waagent[1534]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.279361 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.279361 waagent[1534]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:41.279361 waagent[1534]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:41.279361 waagent[1534]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:41.288117 waagent[1534]: 2023-10-02T20:36:41.288003Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 20:36:41.288117 waagent[1534]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.288117 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.288117 waagent[1534]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.288117 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.288117 waagent[1534]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:41.288117 waagent[1534]: pkts bytes target prot opt in out source destination Oct 2 20:36:41.288117 waagent[1534]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:41.288117 waagent[1534]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:41.288117 waagent[1534]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:41.288632 waagent[1534]: 2023-10-02T20:36:41.288576Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 20:37:06.747334 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Oct 2 20:37:13.619350 systemd[1]: Created slice system-sshd.slice. Oct 2 20:37:13.620480 systemd[1]: Started sshd@0-10.200.20.37:22-10.200.12.6:42532.service. Oct 2 20:37:13.760350 update_engine[1340]: I1002 20:37:13.760316 1340 update_attempter.cc:505] Updating boot flags... Oct 2 20:37:14.235359 sshd[1582]: Accepted publickey for core from 10.200.12.6 port 42532 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:14.252112 sshd[1582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:14.256873 systemd[1]: Started session-3.scope. Oct 2 20:37:14.257177 systemd-logind[1338]: New session 3 of user core. Oct 2 20:37:14.602775 systemd[1]: Started sshd@1-10.200.20.37:22-10.200.12.6:42540.service. Oct 2 20:37:15.023737 sshd[1653]: Accepted publickey for core from 10.200.12.6 port 42540 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:15.025590 sshd[1653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:15.029314 systemd-logind[1338]: New session 4 of user core. Oct 2 20:37:15.029805 systemd[1]: Started session-4.scope. Oct 2 20:37:15.332055 sshd[1653]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:15.335199 systemd-logind[1338]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:37:15.335771 systemd[1]: sshd@1-10.200.20.37:22-10.200.12.6:42540.service: Deactivated successfully. Oct 2 20:37:15.336459 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:37:15.337099 systemd-logind[1338]: Removed session 4. Oct 2 20:37:15.402253 systemd[1]: Started sshd@2-10.200.20.37:22-10.200.12.6:42546.service. Oct 2 20:37:15.816832 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 42546 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:15.818422 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:15.822316 systemd-logind[1338]: New session 5 of user core. Oct 2 20:37:15.822754 systemd[1]: Started session-5.scope. Oct 2 20:37:16.115031 sshd[1659]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:16.117825 systemd[1]: sshd@2-10.200.20.37:22-10.200.12.6:42546.service: Deactivated successfully. Oct 2 20:37:16.118499 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:37:16.119042 systemd-logind[1338]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:37:16.119875 systemd-logind[1338]: Removed session 5. Oct 2 20:37:16.185537 systemd[1]: Started sshd@3-10.200.20.37:22-10.200.12.6:42558.service. Oct 2 20:37:16.605801 sshd[1665]: Accepted publickey for core from 10.200.12.6 port 42558 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:16.607363 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:16.611343 systemd-logind[1338]: New session 6 of user core. Oct 2 20:37:16.611790 systemd[1]: Started session-6.scope. Oct 2 20:37:16.914295 sshd[1665]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:16.917279 systemd-logind[1338]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:37:16.917368 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:37:16.918329 systemd[1]: sshd@3-10.200.20.37:22-10.200.12.6:42558.service: Deactivated successfully. Oct 2 20:37:16.919006 systemd-logind[1338]: Removed session 6. Oct 2 20:37:16.984007 systemd[1]: Started sshd@4-10.200.20.37:22-10.200.12.6:42566.service. Oct 2 20:37:17.398986 sshd[1671]: Accepted publickey for core from 10.200.12.6 port 42566 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:17.400617 sshd[1671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:17.404314 systemd-logind[1338]: New session 7 of user core. Oct 2 20:37:17.405033 systemd[1]: Started session-7.scope. Oct 2 20:37:17.909134 sudo[1674]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:37:17.909663 sudo[1674]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:17.947437 dbus-daemon[1323]: avc: received setenforce notice (enforcing=1) Oct 2 20:37:17.949981 sudo[1674]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:18.031360 sshd[1671]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:18.034484 systemd-logind[1338]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:37:18.034611 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:37:18.035157 systemd[1]: sshd@4-10.200.20.37:22-10.200.12.6:42566.service: Deactivated successfully. Oct 2 20:37:18.036174 systemd-logind[1338]: Removed session 7. Oct 2 20:37:18.101176 systemd[1]: Started sshd@5-10.200.20.37:22-10.200.12.6:41198.service. Oct 2 20:37:18.516760 sshd[1678]: Accepted publickey for core from 10.200.12.6 port 41198 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:18.518496 sshd[1678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:18.522314 systemd-logind[1338]: New session 8 of user core. Oct 2 20:37:18.522925 systemd[1]: Started session-8.scope. Oct 2 20:37:18.757430 sudo[1685]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:37:18.757900 sudo[1685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:18.761242 sudo[1685]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:18.767095 sudo[1684]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:37:18.767330 sudo[1684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:18.778248 systemd[1]: Stopping audit-rules.service... Oct 2 20:37:18.780000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:18.780623 auditctl[1688]: No rules Oct 2 20:37:18.781040 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:37:18.781197 systemd[1]: Stopped audit-rules.service. Oct 2 20:37:18.791204 systemd[1]: Starting audit-rules.service... Oct 2 20:37:18.780000 audit[1688]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd238fd30 a2=420 a3=0 items=0 ppid=1 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:18.815763 kernel: audit: type=1305 audit(1696279038.780:175): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:18.815874 kernel: audit: type=1300 audit(1696279038.780:175): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd238fd30 a2=420 a3=0 items=0 ppid=1 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:18.780000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:18.823319 kernel: audit: type=1327 audit(1696279038.780:175): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:18.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.842111 kernel: audit: type=1131 audit(1696279038.780:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.856210 augenrules[1705]: No rules Oct 2 20:37:18.857439 systemd[1]: Finished audit-rules.service. Oct 2 20:37:18.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.873869 sudo[1684]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:18.873000 audit[1684]: USER_END pid=1684 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.892345 kernel: audit: type=1130 audit(1696279038.857:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.892431 kernel: audit: type=1106 audit(1696279038.873:178): pid=1684 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.873000 audit[1684]: CRED_DISP pid=1684 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.909926 kernel: audit: type=1104 audit(1696279038.873:179): pid=1684 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:18.957464 sshd[1678]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:18.958000 audit[1678]: USER_END pid=1678 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:18.981052 systemd[1]: sshd@5-10.200.20.37:22-10.200.12.6:41198.service: Deactivated successfully. Oct 2 20:37:18.958000 audit[1678]: CRED_DISP pid=1678 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.000349 kernel: audit: type=1106 audit(1696279038.958:180): pid=1678 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.000414 kernel: audit: type=1104 audit(1696279038.958:181): pid=1678 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:18.981790 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:37:18.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.37:22-10.200.12.6:41198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.000963 systemd-logind[1338]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:37:19.001326 kernel: audit: type=1131 audit(1696279038.980:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.37:22-10.200.12.6:41198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.020623 systemd-logind[1338]: Removed session 8. Oct 2 20:37:19.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.37:22-10.200.12.6:41208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.032087 systemd[1]: Started sshd@6-10.200.20.37:22-10.200.12.6:41208.service. Oct 2 20:37:19.480000 audit[1711]: USER_ACCT pid=1711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.480508 sshd[1711]: Accepted publickey for core from 10.200.12.6 port 41208 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:19.481000 audit[1711]: CRED_ACQ pid=1711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.481000 audit[1711]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff438a140 a2=3 a3=1 items=0 ppid=1 pid=1711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:19.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:37:19.482445 sshd[1711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:19.486862 systemd[1]: Started session-9.scope. Oct 2 20:37:19.488174 systemd-logind[1338]: New session 9 of user core. Oct 2 20:37:19.492000 audit[1711]: USER_START pid=1711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.495000 audit[1713]: CRED_ACQ pid=1713 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.737000 audit[1714]: USER_ACCT pid=1714 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.737889 sudo[1714]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:37:19.737000 audit[1714]: CRED_REFR pid=1714 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.738411 sudo[1714]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:19.739000 audit[1714]: USER_START pid=1714 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.416492 systemd[1]: Starting docker.service... Oct 2 20:37:20.464876 env[1729]: time="2023-10-02T20:37:20.464830624Z" level=info msg="Starting up" Oct 2 20:37:20.476967 env[1729]: time="2023-10-02T20:37:20.476927053Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:20.476967 env[1729]: time="2023-10-02T20:37:20.476957372Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:20.477074 env[1729]: time="2023-10-02T20:37:20.476979572Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:20.477074 env[1729]: time="2023-10-02T20:37:20.476991532Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:20.479785 env[1729]: time="2023-10-02T20:37:20.479757382Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:20.479874 env[1729]: time="2023-10-02T20:37:20.479860661Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:20.479955 env[1729]: time="2023-10-02T20:37:20.479936300Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:20.480013 env[1729]: time="2023-10-02T20:37:20.480000179Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:20.485871 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport485386745-merged.mount: Deactivated successfully. Oct 2 20:37:20.564785 env[1729]: time="2023-10-02T20:37:20.564743737Z" level=info msg="Loading containers: start." Oct 2 20:37:20.656000 audit[1756]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.656000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffcbe625d0 a2=0 a3=1 items=0 ppid=1729 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 20:37:20.660000 audit[1758]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.660000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd1fb3390 a2=0 a3=1 items=0 ppid=1729 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 20:37:20.663000 audit[1760]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.663000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffd299a40 a2=0 a3=1 items=0 ppid=1729 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:20.666000 audit[1762]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.666000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffffcd7570 a2=0 a3=1 items=0 ppid=1729 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.666000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:20.670000 audit[1764]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.670000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc5e1db30 a2=0 a3=1 items=0 ppid=1729 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 20:37:20.673000 audit[1766]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.673000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffbfb2030 a2=0 a3=1 items=0 ppid=1729 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 20:37:20.687000 audit[1768]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.687000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffe03be30 a2=0 a3=1 items=0 ppid=1729 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 20:37:20.691000 audit[1770]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.691000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc3985ab0 a2=0 a3=1 items=0 ppid=1729 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 20:37:20.695000 audit[1772]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.695000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffec494360 a2=0 a3=1 items=0 ppid=1729 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:20.713000 audit[1776]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.713000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff14ee6a0 a2=0 a3=1 items=0 ppid=1729 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:20.715000 audit[1777]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.715000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd02791d0 a2=0 a3=1 items=0 ppid=1729 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.715000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:20.753291 kernel: Initializing XFRM netlink socket Oct 2 20:37:20.776244 env[1729]: time="2023-10-02T20:37:20.776211075Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 20:37:20.856000 audit[1784]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.856000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffce6cabe0 a2=0 a3=1 items=0 ppid=1729 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 20:37:20.889000 audit[1787]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.889000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffee29edc0 a2=0 a3=1 items=0 ppid=1729 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 20:37:20.894000 audit[1790]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.894000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff61de840 a2=0 a3=1 items=0 ppid=1729 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:20.897000 audit[1792]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.897000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdd0372c0 a2=0 a3=1 items=0 ppid=1729 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:20.900000 audit[1794]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.900000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe5616540 a2=0 a3=1 items=0 ppid=1729 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 20:37:20.903000 audit[1796]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.903000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc9ca3db0 a2=0 a3=1 items=0 ppid=1729 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 20:37:20.907000 audit[1798]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.907000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcc0e8890 a2=0 a3=1 items=0 ppid=1729 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 20:37:20.911000 audit[1800]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.911000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffc4f42f0 a2=0 a3=1 items=0 ppid=1729 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.911000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 20:37:20.914000 audit[1802]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.914000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffda9cf840 a2=0 a3=1 items=0 ppid=1729 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:20.918000 audit[1804]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.918000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd7205580 a2=0 a3=1 items=0 ppid=1729 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:20.923000 audit[1806]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.923000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd322bd50 a2=0 a3=1 items=0 ppid=1729 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.923000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 20:37:20.924391 systemd-networkd[1494]: docker0: Link UP Oct 2 20:37:20.939000 audit[1810]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.939000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0789e80 a2=0 a3=1 items=0 ppid=1729 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:20.941000 audit[1811]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:20.941000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffc1bec80 a2=0 a3=1 items=0 ppid=1729 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:20.942331 env[1729]: time="2023-10-02T20:37:20.942297788Z" level=info msg="Loading containers: done." Oct 2 20:37:20.954506 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1317926523-merged.mount: Deactivated successfully. Oct 2 20:37:20.989692 env[1729]: time="2023-10-02T20:37:20.989643712Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 20:37:20.989886 env[1729]: time="2023-10-02T20:37:20.989869350Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 20:37:20.989999 env[1729]: time="2023-10-02T20:37:20.989973549Z" level=info msg="Daemon has completed initialization" Oct 2 20:37:21.019783 systemd[1]: Started docker.service. Oct 2 20:37:21.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.027254 env[1729]: time="2023-10-02T20:37:21.027163002Z" level=info msg="API listen on /run/docker.sock" Oct 2 20:37:21.052096 systemd[1]: Reloading. Oct 2 20:37:21.163633 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2023-10-02T20:37:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:21.163660 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2023-10-02T20:37:21Z" level=info msg="torcx already run" Oct 2 20:37:21.280777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:21.280797 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:21.299508 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit: BPF prog-id=38 op=LOAD Oct 2 20:37:21.378000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit: BPF prog-id=39 op=LOAD Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.378000 audit: BPF prog-id=40 op=LOAD Oct 2 20:37:21.378000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:37:21.378000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.379000 audit: BPF prog-id=41 op=LOAD Oct 2 20:37:21.379000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit: BPF prog-id=42 op=LOAD Oct 2 20:37:21.381000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit: BPF prog-id=43 op=LOAD Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.381000 audit: BPF prog-id=44 op=LOAD Oct 2 20:37:21.381000 audit: BPF prog-id=33 op=UNLOAD Oct 2 20:37:21.381000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit: BPF prog-id=45 op=LOAD Oct 2 20:37:21.382000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit: BPF prog-id=46 op=LOAD Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit: BPF prog-id=47 op=LOAD Oct 2 20:37:21.382000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:37:21.382000 audit: BPF prog-id=23 op=UNLOAD Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.383000 audit: BPF prog-id=48 op=LOAD Oct 2 20:37:21.383000 audit: BPF prog-id=30 op=UNLOAD Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.384000 audit: BPF prog-id=49 op=LOAD Oct 2 20:37:21.384000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit: BPF prog-id=50 op=LOAD Oct 2 20:37:21.386000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit: BPF prog-id=51 op=LOAD Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:21.386000 audit: BPF prog-id=52 op=LOAD Oct 2 20:37:21.386000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:37:21.386000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:37:21.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.394449 systemd[1]: Started kubelet.service. Oct 2 20:37:21.473817 kubelet[1916]: E1002 20:37:21.473153 1916 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:21.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:21.476395 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:21.476520 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:25.489627 env[1352]: time="2023-10-02T20:37:25.489572751Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\"" Oct 2 20:37:26.295195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1867637.mount: Deactivated successfully. Oct 2 20:37:28.681040 env[1352]: time="2023-10-02T20:37:28.680988331Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:28.685416 env[1352]: time="2023-10-02T20:37:28.685387063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebd6eba6928e5f8f82d90c8538a99543a7f31a39cfbb40e52bf9c5486da9a2dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:28.688906 env[1352]: time="2023-10-02T20:37:28.688867269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:28.692467 env[1352]: time="2023-10-02T20:37:28.692441864Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:bb3eff7d20d94d44ffea47066a4400a70ede58abd9de01c80400817a955397b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:28.693344 env[1352]: time="2023-10-02T20:37:28.693316456Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\" returns image reference \"sha256:ebd6eba6928e5f8f82d90c8538a99543a7f31a39cfbb40e52bf9c5486da9a2dc\"" Oct 2 20:37:28.708376 env[1352]: time="2023-10-02T20:37:28.708343023Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\"" Oct 2 20:37:31.305299 env[1352]: time="2023-10-02T20:37:31.305245845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.310840 env[1352]: time="2023-10-02T20:37:31.310797557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:439086a7540e058995295148eb4f15a3d14f129b494e3d5645fb1742cd799c1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.314186 env[1352]: time="2023-10-02T20:37:31.314153520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.318787 env[1352]: time="2023-10-02T20:37:31.318759962Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:44d63bed8020f7610851a1a653ad7c6df83bd02ad128303de939a39997854ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.319472 env[1352]: time="2023-10-02T20:37:31.319440837Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\" returns image reference \"sha256:439086a7540e058995295148eb4f15a3d14f129b494e3d5645fb1742cd799c1e\"" Oct 2 20:37:31.333859 env[1352]: time="2023-10-02T20:37:31.333832406Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\"" Oct 2 20:37:31.603092 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 20:37:31.603303 systemd[1]: Stopped kubelet.service. Oct 2 20:37:31.624774 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 20:37:31.624878 kernel: audit: type=1130 audit(1696279051.602:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.604907 systemd[1]: Started kubelet.service. Oct 2 20:37:31.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.641177 kernel: audit: type=1131 audit(1696279051.602:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.660094 kernel: audit: type=1130 audit(1696279051.603:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:31.705052 kubelet[1945]: E1002 20:37:31.705009 1945 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:31.707895 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:31.708036 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:31.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:31.727298 kernel: audit: type=1131 audit(1696279051.706:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:33.300395 env[1352]: time="2023-10-02T20:37:33.300351191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.304545 env[1352]: time="2023-10-02T20:37:33.304519723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4405f55bf1c9d908a16c5c9894679cdf78c6235dd653ca6d7cb78a8d7b4644d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.307946 env[1352]: time="2023-10-02T20:37:33.307912844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.311133 env[1352]: time="2023-10-02T20:37:33.311099229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:207b36120eca76bf8607682a3ee37e12b5156b921a9379d776b297ab01ca8198,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.311905 env[1352]: time="2023-10-02T20:37:33.311876240Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\" returns image reference \"sha256:4405f55bf1c9d908a16c5c9894679cdf78c6235dd653ca6d7cb78a8d7b4644d0\"" Oct 2 20:37:33.325128 env[1352]: time="2023-10-02T20:37:33.325097350Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 20:37:34.718394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3894572667.mount: Deactivated successfully. Oct 2 20:37:35.126654 env[1352]: time="2023-10-02T20:37:35.126601860Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.132539 env[1352]: time="2023-10-02T20:37:35.132504257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.135452 env[1352]: time="2023-10-02T20:37:35.135426088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.138318 env[1352]: time="2023-10-02T20:37:35.138283223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.138837 env[1352]: time="2023-10-02T20:37:35.138809358Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e\"" Oct 2 20:37:35.152506 env[1352]: time="2023-10-02T20:37:35.152467909Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\"" Oct 2 20:37:35.742522 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3281560003.mount: Deactivated successfully. Oct 2 20:37:35.761577 env[1352]: time="2023-10-02T20:37:35.761532114Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.768400 env[1352]: time="2023-10-02T20:37:35.768177982Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42fb3c9d90ed7895bc04a9d96fe3102a65b521f485cc5a4f3dd818afef9cef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.772678 env[1352]: time="2023-10-02T20:37:35.772640929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.776878 env[1352]: time="2023-10-02T20:37:35.776849851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.778308 env[1352]: time="2023-10-02T20:37:35.777213545Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\" returns image reference \"sha256:4e42fb3c9d90ed7895bc04a9d96fe3102a65b521f485cc5a4f3dd818afef9cef\"" Oct 2 20:37:35.794870 env[1352]: time="2023-10-02T20:37:35.794835515Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 20:37:36.908343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4070878825.mount: Deactivated successfully. Oct 2 20:37:40.366063 env[1352]: time="2023-10-02T20:37:40.366004062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:40.371223 env[1352]: time="2023-10-02T20:37:40.371191188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:40.374985 env[1352]: time="2023-10-02T20:37:40.374958554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:40.380217 env[1352]: time="2023-10-02T20:37:40.380189490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:40.380887 env[1352]: time="2023-10-02T20:37:40.380859200Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Oct 2 20:37:40.394535 env[1352]: time="2023-10-02T20:37:40.394498905Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 20:37:41.126456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount169610859.mount: Deactivated successfully. Oct 2 20:37:41.853087 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 20:37:41.995530 kernel: audit: type=1130 audit(1696279061.852:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.995607 kernel: audit: type=1131 audit(1696279061.852:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.995627 kernel: audit: type=1130 audit(1696279061.852:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.995645 kernel: audit: type=1131 audit(1696279061.949:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:41.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:41.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:41.853290 systemd[1]: Stopped kubelet.service. Oct 2 20:37:41.995896 kubelet[1973]: E1002 20:37:41.947983 1973 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: op Oct 2 20:37:41.995896 kubelet[1973]: en /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:41.854754 systemd[1]: Started kubelet.service. Oct 2 20:37:41.950028 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:41.950150 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:42.817431 env[1352]: time="2023-10-02T20:37:42.817380949Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.822511 env[1352]: time="2023-10-02T20:37:42.822459431Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.828003 env[1352]: time="2023-10-02T20:37:42.827949961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.831295 env[1352]: time="2023-10-02T20:37:42.831152404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.831870 env[1352]: time="2023-10-02T20:37:42.831768135Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Oct 2 20:37:47.894301 systemd[1]: Stopped kubelet.service. Oct 2 20:37:47.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:47.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:47.930974 kernel: audit: type=1130 audit(1696279067.893:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:47.931059 kernel: audit: type=1131 audit(1696279067.893:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:47.937279 systemd[1]: Reloading. Oct 2 20:37:48.043385 /usr/lib/systemd/system-generators/torcx-generator[2057]: time="2023-10-02T20:37:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:48.043710 /usr/lib/systemd/system-generators/torcx-generator[2057]: time="2023-10-02T20:37:48Z" level=info msg="torcx already run" Oct 2 20:37:48.162326 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:48.162345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:48.180319 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:48.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.294166 kernel: audit: type=1400 audit(1696279068.262:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.294278 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:37:48.294309 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:37:48.294330 kernel: audit: backlog limit exceeded Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.314739 kernel: audit: type=1400 audit(1696279068.279:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.314867 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.336208 kernel: audit: type=1400 audit(1696279068.279:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.336302 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit: BPF prog-id=53 op=LOAD Oct 2 20:37:48.279000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit: BPF prog-id=54 op=LOAD Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.279000 audit: BPF prog-id=55 op=LOAD Oct 2 20:37:48.279000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:37:48.279000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.280000 audit: BPF prog-id=56 op=LOAD Oct 2 20:37:48.280000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit: BPF prog-id=57 op=LOAD Oct 2 20:37:48.282000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.297000 audit: BPF prog-id=58 op=LOAD Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit: BPF prog-id=59 op=LOAD Oct 2 20:37:48.341000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:37:48.341000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit: BPF prog-id=60 op=LOAD Oct 2 20:37:48.342000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit: BPF prog-id=61 op=LOAD Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit: BPF prog-id=62 op=LOAD Oct 2 20:37:48.342000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:37:48.342000 audit: BPF prog-id=47 op=UNLOAD Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.342000 audit: BPF prog-id=63 op=LOAD Oct 2 20:37:48.342000 audit: BPF prog-id=48 op=UNLOAD Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.344000 audit: BPF prog-id=64 op=LOAD Oct 2 20:37:48.344000 audit: BPF prog-id=49 op=UNLOAD Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit: BPF prog-id=65 op=LOAD Oct 2 20:37:48.345000 audit: BPF prog-id=50 op=UNLOAD Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit: BPF prog-id=66 op=LOAD Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.346000 audit: BPF prog-id=67 op=LOAD Oct 2 20:37:48.346000 audit: BPF prog-id=51 op=UNLOAD Oct 2 20:37:48.346000 audit: BPF prog-id=52 op=UNLOAD Oct 2 20:37:48.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:48.367687 systemd[1]: Started kubelet.service. Oct 2 20:37:48.432414 kubelet[2117]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:37:48.435306 kubelet[2117]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:48.435306 kubelet[2117]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:48.435422 kubelet[2117]: I1002 20:37:48.435383 2117 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:48.436790 kubelet[2117]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:37:48.436790 kubelet[2117]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:48.436790 kubelet[2117]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:49.158121 kubelet[2117]: I1002 20:37:49.158089 2117 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 20:37:49.158121 kubelet[2117]: I1002 20:37:49.158114 2117 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:49.158745 kubelet[2117]: I1002 20:37:49.158719 2117 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 20:37:49.164232 kubelet[2117]: E1002 20:37:49.164212 2117 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.164392 kubelet[2117]: I1002 20:37:49.164380 2117 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:49.166203 kubelet[2117]: W1002 20:37:49.166184 2117 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:49.166736 kubelet[2117]: I1002 20:37:49.166720 2117 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:49.166914 kubelet[2117]: I1002 20:37:49.166901 2117 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:49.166980 kubelet[2117]: I1002 20:37:49.166964 2117 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 20:37:49.167075 kubelet[2117]: I1002 20:37:49.167007 2117 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:49.167075 kubelet[2117]: I1002 20:37:49.167023 2117 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 20:37:49.167126 kubelet[2117]: I1002 20:37:49.167110 2117 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:49.170741 kubelet[2117]: W1002 20:37:49.170705 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-f31f601c03&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.170864 kubelet[2117]: E1002 20:37:49.170854 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-f31f601c03&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.170984 kubelet[2117]: I1002 20:37:49.170973 2117 kubelet.go:381] "Attempting to sync node with API server" Oct 2 20:37:49.171053 kubelet[2117]: I1002 20:37:49.171045 2117 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:49.171132 kubelet[2117]: I1002 20:37:49.171123 2117 kubelet.go:281] "Adding apiserver pod source" Oct 2 20:37:49.171205 kubelet[2117]: I1002 20:37:49.171197 2117 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:49.172199 kubelet[2117]: W1002 20:37:49.172171 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.172349 kubelet[2117]: E1002 20:37:49.172339 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.172581 kubelet[2117]: I1002 20:37:49.172568 2117 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:49.173036 kubelet[2117]: W1002 20:37:49.173019 2117 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:37:49.173585 kubelet[2117]: I1002 20:37:49.173566 2117 server.go:1175] "Started kubelet" Oct 2 20:37:49.175706 kubelet[2117]: E1002 20:37:49.175681 2117 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:49.175706 kubelet[2117]: E1002 20:37:49.175709 2117 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:49.176014 kubelet[2117]: E1002 20:37:49.175898 2117 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-f31f601c03.178a64d37e05011e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-f31f601c03", UID:"ci-3510.3.0-a-f31f601c03", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-f31f601c03"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 49, 173547294, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 49, 173547294, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.37:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.37:6443: connect: connection refused'(may retry after sleeping) Oct 2 20:37:49.175000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.175000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:49.175000 audit[2117]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c2c420 a1=4000ac16b0 a2=4000c2c3f0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.175000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:49.176731 kubelet[2117]: I1002 20:37:49.176712 2117 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:49.175000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.175000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:49.175000 audit[2117]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004c3a40 a1=4000ac16c8 a2=4000c2c4b0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.175000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:49.176984 kubelet[2117]: I1002 20:37:49.176733 2117 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:49.177034 kubelet[2117]: I1002 20:37:49.177021 2117 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:49.177235 kubelet[2117]: I1002 20:37:49.177224 2117 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:49.177518 kubelet[2117]: I1002 20:37:49.177495 2117 server.go:438] "Adding debug handlers to kubelet server" Oct 2 20:37:49.180572 kubelet[2117]: I1002 20:37:49.180546 2117 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 20:37:49.180635 kubelet[2117]: I1002 20:37:49.180601 2117 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 20:37:49.180926 kubelet[2117]: W1002 20:37:49.180897 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.180962 kubelet[2117]: E1002 20:37:49.180935 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.181158 kubelet[2117]: E1002 20:37:49.181138 2117 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.181931 kubelet[2117]: E1002 20:37:49.181910 2117 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:37:49.186000 audit[2132]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.186000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff0207860 a2=0 a3=1 items=0 ppid=2117 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:49.199000 audit[2134]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.199000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc087b100 a2=0 a3=1 items=0 ppid=2117 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:37:49.205000 audit[2136]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.205000 audit[2136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2849340 a2=0 a3=1 items=0 ppid=2117 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:49.208000 audit[2138]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.208000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeec37100 a2=0 a3=1 items=0 ppid=2117 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:49.246000 audit[2143]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.246000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe2e621a0 a2=0 a3=1 items=0 ppid=2117 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:37:49.248000 audit[2144]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.248000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd2250640 a2=0 a3=1 items=0 ppid=2117 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:37:49.270180 kubelet[2117]: I1002 20:37:49.270161 2117 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 20:37:49.270344 kubelet[2117]: I1002 20:37:49.270333 2117 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:49.270430 kubelet[2117]: I1002 20:37:49.270421 2117 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:49.270000 audit[2147]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.270000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcc1b1d50 a2=0 a3=1 items=0 ppid=2117 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:37:49.274245 kubelet[2117]: I1002 20:37:49.274195 2117 policy_none.go:49] "None policy: Start" Oct 2 20:37:49.274816 kubelet[2117]: I1002 20:37:49.274796 2117 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 20:37:49.274872 kubelet[2117]: I1002 20:37:49.274822 2117 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:49.280651 systemd[1]: Created slice kubepods.slice. Oct 2 20:37:49.281672 kubelet[2117]: E1002 20:37:49.281166 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.284750 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:37:49.285837 kubelet[2117]: I1002 20:37:49.285735 2117 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.286044 kubelet[2117]: E1002 20:37:49.286026 2117 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.288395 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:37:49.296453 kubelet[2117]: I1002 20:37:49.296428 2117 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:49.295000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.295000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:49.295000 audit[2117]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e75050 a1=4000c973e0 a2=4000e74ff0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.295000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:49.297602 kubelet[2117]: I1002 20:37:49.297320 2117 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:49.298644 kubelet[2117]: E1002 20:37:49.298620 2117 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.298726 kubelet[2117]: I1002 20:37:49.298430 2117 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:49.317000 audit[2150]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.317000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcc12c8b0 a2=0 a3=1 items=0 ppid=2117 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:37:49.318000 audit[2151]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.318000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcc2e0e0 a2=0 a3=1 items=0 ppid=2117 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:37:49.320000 audit[2152]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.320000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc68aee0 a2=0 a3=1 items=0 ppid=2117 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:37:49.323000 audit[2154]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.323000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffa779040 a2=0 a3=1 items=0 ppid=2117 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:37:49.326000 audit[2156]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.326000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe04bff90 a2=0 a3=1 items=0 ppid=2117 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:37:49.329000 audit[2158]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.329000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc1e2b1e0 a2=0 a3=1 items=0 ppid=2117 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:37:49.333000 audit[2160]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.333000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffcd570120 a2=0 a3=1 items=0 ppid=2117 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:37:49.336000 audit[2162]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.336000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe7acfbe0 a2=0 a3=1 items=0 ppid=2117 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:37:49.337953 kubelet[2117]: I1002 20:37:49.337935 2117 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:49.338000 audit[2163]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.338000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd5ccc50 a2=0 a3=1 items=0 ppid=2117 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:49.338000 audit[2164]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.338000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfc87a10 a2=0 a3=1 items=0 ppid=2117 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:49.339000 audit[2166]: NETFILTER_CFG table=nat:46 family=10 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.339000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd8035af0 a2=0 a3=1 items=0 ppid=2117 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:37:49.339000 audit[2165]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.339000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2143ee0 a2=0 a3=1 items=0 ppid=2117 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:49.341000 audit[2167]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:49.341000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc85cce50 a2=0 a3=1 items=0 ppid=2117 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:49.343000 audit[2169]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.343000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdc4d2430 a2=0 a3=1 items=0 ppid=2117 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:37:49.344000 audit[2170]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.344000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffcdbe960 a2=0 a3=1 items=0 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:37:49.347000 audit[2172]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.347000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe48e2bf0 a2=0 a3=1 items=0 ppid=2117 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:37:49.349000 audit[2173]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.349000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcbf9a8f0 a2=0 a3=1 items=0 ppid=2117 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:37:49.350000 audit[2174]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.350000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc881ac10 a2=0 a3=1 items=0 ppid=2117 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:37:49.353000 audit[2176]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.353000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff3db2450 a2=0 a3=1 items=0 ppid=2117 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:37:49.356000 audit[2178]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.356000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffe17f430 a2=0 a3=1 items=0 ppid=2117 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:37:49.360000 audit[2180]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.360000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffcda1ac80 a2=0 a3=1 items=0 ppid=2117 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:37:49.363000 audit[2182]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.363000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe4f10d10 a2=0 a3=1 items=0 ppid=2117 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:37:49.381807 kubelet[2117]: E1002 20:37:49.381780 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.382098 kubelet[2117]: E1002 20:37:49.382069 2117 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.382000 audit[2184]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.382000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffdb62f610 a2=0 a3=1 items=0 ppid=2117 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:37:49.384454 kubelet[2117]: I1002 20:37:49.384435 2117 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:49.384524 kubelet[2117]: I1002 20:37:49.384484 2117 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 20:37:49.384524 kubelet[2117]: I1002 20:37:49.384498 2117 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 20:37:49.384572 kubelet[2117]: E1002 20:37:49.384543 2117 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 20:37:49.385435 kubelet[2117]: W1002 20:37:49.384966 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.385435 kubelet[2117]: E1002 20:37:49.385009 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.385000 audit[2185]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.385000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb56f210 a2=0 a3=1 items=0 ppid=2117 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:49.386000 audit[2186]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.386000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc94b4830 a2=0 a3=1 items=0 ppid=2117 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:49.388000 audit[2187]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:49.388000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffddd2c2a0 a2=0 a3=1 items=0 ppid=2117 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:49.482230 kubelet[2117]: E1002 20:37:49.482148 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.485423 kubelet[2117]: I1002 20:37:49.485403 2117 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:49.486933 kubelet[2117]: I1002 20:37:49.486916 2117 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:49.487473 kubelet[2117]: I1002 20:37:49.487457 2117 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.488597 kubelet[2117]: I1002 20:37:49.488581 2117 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:49.488791 kubelet[2117]: E1002 20:37:49.488779 2117 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.490747 kubelet[2117]: I1002 20:37:49.490733 2117 status_manager.go:667] "Failed to get status for pod" podUID=be010720696b682266d9c20fc68784c0 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" err="Get \"https://10.200.20.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-f31f601c03\": dial tcp 10.200.20.37:6443: connect: connection refused" Oct 2 20:37:49.491822 kubelet[2117]: I1002 20:37:49.491804 2117 status_manager.go:667] "Failed to get status for pod" podUID=b3756fc2909a22add2550263fb5c7660 pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" err="Get \"https://10.200.20.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-f31f601c03\": dial tcp 10.200.20.37:6443: connect: connection refused" Oct 2 20:37:49.493870 kubelet[2117]: I1002 20:37:49.493855 2117 status_manager.go:667] "Failed to get status for pod" podUID=e7629d363a2feee76e2650394333c0be pod="kube-system/kube-scheduler-ci-3510.3.0-a-f31f601c03" err="Get \"https://10.200.20.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-f31f601c03\": dial tcp 10.200.20.37:6443: connect: connection refused" Oct 2 20:37:49.495480 systemd[1]: Created slice kubepods-burstable-podbe010720696b682266d9c20fc68784c0.slice. Oct 2 20:37:49.508007 systemd[1]: Created slice kubepods-burstable-podb3756fc2909a22add2550263fb5c7660.slice. Oct 2 20:37:49.511710 systemd[1]: Created slice kubepods-burstable-pode7629d363a2feee76e2650394333c0be.slice. Oct 2 20:37:49.582592 kubelet[2117]: E1002 20:37:49.582559 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.582749 kubelet[2117]: I1002 20:37:49.582559 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.582863 kubelet[2117]: I1002 20:37:49.582847 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.582956 kubelet[2117]: I1002 20:37:49.582947 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583048 kubelet[2117]: I1002 20:37:49.583038 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583153 kubelet[2117]: I1002 20:37:49.583143 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583249 kubelet[2117]: I1002 20:37:49.583238 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583352 kubelet[2117]: I1002 20:37:49.583341 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583448 kubelet[2117]: I1002 20:37:49.583437 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.583540 kubelet[2117]: I1002 20:37:49.583529 2117 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e7629d363a2feee76e2650394333c0be-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-f31f601c03\" (UID: \"e7629d363a2feee76e2650394333c0be\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.683054 kubelet[2117]: E1002 20:37:49.683031 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.783099 kubelet[2117]: E1002 20:37:49.783001 2117 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:49.783467 kubelet[2117]: E1002 20:37:49.783410 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.808158 env[1352]: time="2023-10-02T20:37:49.807859272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-f31f601c03,Uid:be010720696b682266d9c20fc68784c0,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:49.810399 env[1352]: time="2023-10-02T20:37:49.810366758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-f31f601c03,Uid:b3756fc2909a22add2550263fb5c7660,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:49.814112 env[1352]: time="2023-10-02T20:37:49.814072738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-f31f601c03,Uid:e7629d363a2feee76e2650394333c0be,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:49.884666 kubelet[2117]: E1002 20:37:49.884631 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:49.891159 kubelet[2117]: I1002 20:37:49.891136 2117 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.891469 kubelet[2117]: E1002 20:37:49.891447 2117 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:49.984783 kubelet[2117]: E1002 20:37:49.984747 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.085370 kubelet[2117]: E1002 20:37:50.085258 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.186437 kubelet[2117]: E1002 20:37:50.186377 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.286837 kubelet[2117]: E1002 20:37:50.286804 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.294521 kubelet[2117]: W1002 20:37:50.294476 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.294521 kubelet[2117]: E1002 20:37:50.294507 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.382120 kubelet[2117]: W1002 20:37:50.382049 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-f31f601c03&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.382120 kubelet[2117]: E1002 20:37:50.382104 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-f31f601c03&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.387083 kubelet[2117]: E1002 20:37:50.387065 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.459163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3610973200.mount: Deactivated successfully. Oct 2 20:37:50.479547 env[1352]: time="2023-10-02T20:37:50.479506408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.482880 env[1352]: time="2023-10-02T20:37:50.482855229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.484873 kubelet[2117]: W1002 20:37:50.484795 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.484873 kubelet[2117]: E1002 20:37:50.484846 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.488181 kubelet[2117]: E1002 20:37:50.488131 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.492345 env[1352]: time="2023-10-02T20:37:50.492299828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.495124 env[1352]: time="2023-10-02T20:37:50.495098554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.498246 env[1352]: time="2023-10-02T20:37:50.498207093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.500647 env[1352]: time="2023-10-02T20:37:50.500620552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.502856 env[1352]: time="2023-10-02T20:37:50.502820334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.506063 env[1352]: time="2023-10-02T20:37:50.506037653Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.510350 env[1352]: time="2023-10-02T20:37:50.510324317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.512571 env[1352]: time="2023-10-02T20:37:50.512540061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.520466 env[1352]: time="2023-10-02T20:37:50.520437312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.529249 env[1352]: time="2023-10-02T20:37:50.529203754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:50.568786 env[1352]: time="2023-10-02T20:37:50.568366791Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:50.568786 env[1352]: time="2023-10-02T20:37:50.568466048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:50.568786 env[1352]: time="2023-10-02T20:37:50.568476850Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:50.568786 env[1352]: time="2023-10-02T20:37:50.568623195Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03b265c54f1b34c1880f444d51a2231853e3fe8e0ea91dfabbca7dd8a278d5f4 pid=2196 runtime=io.containerd.runc.v2 Oct 2 20:37:50.583902 kubelet[2117]: E1002 20:37:50.583850 2117 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.586324 env[1352]: time="2023-10-02T20:37:50.586239373Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:50.586324 env[1352]: time="2023-10-02T20:37:50.586292502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:50.586324 env[1352]: time="2023-10-02T20:37:50.586302904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:50.586868 env[1352]: time="2023-10-02T20:37:50.586814233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d pid=2216 runtime=io.containerd.runc.v2 Oct 2 20:37:50.589221 kubelet[2117]: E1002 20:37:50.589188 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.594990 systemd[1]: Started cri-containerd-03b265c54f1b34c1880f444d51a2231853e3fe8e0ea91dfabbca7dd8a278d5f4.scope. Oct 2 20:37:50.625594 systemd[1]: Started cri-containerd-86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d.scope. Oct 2 20:37:50.633463 env[1352]: time="2023-10-02T20:37:50.633278858Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:50.633463 env[1352]: time="2023-10-02T20:37:50.633350710Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:50.633463 env[1352]: time="2023-10-02T20:37:50.633362472Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.633000 audit: BPF prog-id=68 op=LOAD Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2196 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623236356335346631623334633138383066343434643531613232 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2196 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623236356335346631623334633138383066343434643531613232 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit: BPF prog-id=69 op=LOAD Oct 2 20:37:50.635000 audit[2208]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2196 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623236356335346631623334633138383066343434643531613232 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit: BPF prog-id=70 op=LOAD Oct 2 20:37:50.635000 audit[2208]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2196 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623236356335346631623334633138383066343434643531613232 Oct 2 20:37:50.635000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:37:50.635000 audit: BPF prog-id=69 op=UNLOAD Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.635000 audit: BPF prog-id=71 op=LOAD Oct 2 20:37:50.635000 audit[2208]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2196 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623236356335346631623334633138383066343434643531613232 Oct 2 20:37:50.636796 env[1352]: time="2023-10-02T20:37:50.636158758Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc pid=2244 runtime=io.containerd.runc.v2 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.651000 audit: BPF prog-id=72 op=LOAD Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836333639646432383539326638346234333862316633643130666562 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836333639646432383539326638346234333862316633643130666562 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit: BPF prog-id=73 op=LOAD Oct 2 20:37:50.652000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836333639646432383539326638346234333862316633643130666562 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit: BPF prog-id=74 op=LOAD Oct 2 20:37:50.652000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836333639646432383539326638346234333862316633643130666562 Oct 2 20:37:50.652000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:37:50.652000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.652000 audit: BPF prog-id=75 op=LOAD Oct 2 20:37:50.652000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836333639646432383539326638346234333862316633643130666562 Oct 2 20:37:50.668804 kubelet[2117]: W1002 20:37:50.668609 2117 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.668804 kubelet[2117]: E1002 20:37:50.668659 2117 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Oct 2 20:37:50.673892 systemd[1]: Started cri-containerd-6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc.scope. Oct 2 20:37:50.685728 env[1352]: time="2023-10-02T20:37:50.685681353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-f31f601c03,Uid:b3756fc2909a22add2550263fb5c7660,Namespace:kube-system,Attempt:0,} returns sandbox id \"03b265c54f1b34c1880f444d51a2231853e3fe8e0ea91dfabbca7dd8a278d5f4\"" Oct 2 20:37:50.689046 env[1352]: time="2023-10-02T20:37:50.689016652Z" level=info msg="CreateContainer within sandbox \"03b265c54f1b34c1880f444d51a2231853e3fe8e0ea91dfabbca7dd8a278d5f4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 20:37:50.689286 kubelet[2117]: E1002 20:37:50.689232 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.693818 kubelet[2117]: I1002 20:37:50.693526 2117 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:50.693818 kubelet[2117]: E1002 20:37:50.693798 2117 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.693000 audit: BPF prog-id=76 op=LOAD Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393161663833643338353731336137323562316639363339656261 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393161663833643338353731336137323562316639363339656261 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.694000 audit: BPF prog-id=77 op=LOAD Oct 2 20:37:50.694000 audit[2276]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393161663833643338353731336137323562316639363339656261 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.695000 audit: BPF prog-id=78 op=LOAD Oct 2 20:37:50.695000 audit[2276]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393161663833643338353731336137323562316639363339656261 Oct 2 20:37:50.696000 audit: BPF prog-id=78 op=UNLOAD Oct 2 20:37:50.696000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.696000 audit: BPF prog-id=79 op=LOAD Oct 2 20:37:50.696000 audit[2276]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393161663833643338353731336137323562316639363339656261 Oct 2 20:37:50.704106 env[1352]: time="2023-10-02T20:37:50.704064024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-f31f601c03,Uid:be010720696b682266d9c20fc68784c0,Namespace:kube-system,Attempt:0,} returns sandbox id \"86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d\"" Oct 2 20:37:50.706497 env[1352]: time="2023-10-02T20:37:50.706472802Z" level=info msg="CreateContainer within sandbox \"86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 20:37:50.730497 env[1352]: time="2023-10-02T20:37:50.730457805Z" level=info msg="CreateContainer within sandbox \"03b265c54f1b34c1880f444d51a2231853e3fe8e0ea91dfabbca7dd8a278d5f4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a29cf63f90d66d4623a093ecbc377b8e6b39c5bed20a887003f211497789301b\"" Oct 2 20:37:50.731151 env[1352]: time="2023-10-02T20:37:50.731126481Z" level=info msg="StartContainer for \"a29cf63f90d66d4623a093ecbc377b8e6b39c5bed20a887003f211497789301b\"" Oct 2 20:37:50.739031 env[1352]: time="2023-10-02T20:37:50.739000608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-f31f601c03,Uid:e7629d363a2feee76e2650394333c0be,Namespace:kube-system,Attempt:0,} returns sandbox id \"6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc\"" Oct 2 20:37:50.741674 env[1352]: time="2023-10-02T20:37:50.741640146Z" level=info msg="CreateContainer within sandbox \"6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 20:37:50.747572 env[1352]: time="2023-10-02T20:37:50.747535649Z" level=info msg="CreateContainer within sandbox \"86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7\"" Oct 2 20:37:50.748005 env[1352]: time="2023-10-02T20:37:50.747975045Z" level=info msg="StartContainer for \"7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7\"" Oct 2 20:37:50.762396 systemd[1]: Started cri-containerd-a29cf63f90d66d4623a093ecbc377b8e6b39c5bed20a887003f211497789301b.scope. Oct 2 20:37:50.773324 env[1352]: time="2023-10-02T20:37:50.773261634Z" level=info msg="CreateContainer within sandbox \"6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca\"" Oct 2 20:37:50.773770 env[1352]: time="2023-10-02T20:37:50.773740957Z" level=info msg="StartContainer for \"5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca\"" Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.779000 audit: BPF prog-id=80 op=LOAD Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2196 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132396366363366393064363664343632336130393365636263333737 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2196 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132396366363366393064363664343632336130393365636263333737 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.780000 audit: BPF prog-id=81 op=LOAD Oct 2 20:37:50.780000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2196 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132396366363366393064363664343632336130393365636263333737 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit: BPF prog-id=82 op=LOAD Oct 2 20:37:50.781000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2196 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132396366363366393064363664343632336130393365636263333737 Oct 2 20:37:50.781000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:37:50.781000 audit: BPF prog-id=81 op=UNLOAD Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.781000 audit: BPF prog-id=83 op=LOAD Oct 2 20:37:50.781000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2196 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132396366363366393064363664343632336130393365636263333737 Oct 2 20:37:50.789596 kubelet[2117]: E1002 20:37:50.789511 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.793191 systemd[1]: Started cri-containerd-7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7.scope. Oct 2 20:37:50.819328 systemd[1]: Started cri-containerd-5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca.scope. Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit: BPF prog-id=84 op=LOAD Oct 2 20:37:50.827000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.827000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613965333630326633623064343132336163373065333030393132 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613965333630326633623064343132336163373065333030393132 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.828000 audit: BPF prog-id=85 op=LOAD Oct 2 20:37:50.828000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613965333630326633623064343132336163373065333030393132 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.829000 audit: BPF prog-id=86 op=LOAD Oct 2 20:37:50.829000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613965333630326633623064343132336163373065333030393132 Oct 2 20:37:50.829000 audit: BPF prog-id=86 op=UNLOAD Oct 2 20:37:50.830000 audit: BPF prog-id=85 op=UNLOAD Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.830000 audit: BPF prog-id=87 op=LOAD Oct 2 20:37:50.830000 audit[2343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613965333630326633623064343132336163373065333030393132 Oct 2 20:37:50.837126 env[1352]: time="2023-10-02T20:37:50.837088913Z" level=info msg="StartContainer for \"a29cf63f90d66d4623a093ecbc377b8e6b39c5bed20a887003f211497789301b\" returns successfully" Oct 2 20:37:50.863822 env[1352]: time="2023-10-02T20:37:50.863779145Z" level=info msg="StartContainer for \"7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7\" returns successfully" Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.863000 audit: BPF prog-id=88 op=LOAD Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663032353866663161353266363465333238333638393538666135 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663032353866663161353266363465333238333638393538666135 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit: BPF prog-id=89 op=LOAD Oct 2 20:37:50.864000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663032353866663161353266363465333238333638393538666135 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit: BPF prog-id=90 op=LOAD Oct 2 20:37:50.864000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663032353866663161353266363465333238333638393538666135 Oct 2 20:37:50.864000 audit: BPF prog-id=90 op=UNLOAD Oct 2 20:37:50.864000 audit: BPF prog-id=89 op=UNLOAD Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:50.864000 audit: BPF prog-id=91 op=LOAD Oct 2 20:37:50.864000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:50.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561663032353866663161353266363465333238333638393538666135 Oct 2 20:37:50.890119 kubelet[2117]: E1002 20:37:50.890023 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:50.901134 env[1352]: time="2023-10-02T20:37:50.901092342Z" level=info msg="StartContainer for \"5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca\" returns successfully" Oct 2 20:37:50.991075 kubelet[2117]: E1002 20:37:50.991025 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.091406 kubelet[2117]: E1002 20:37:51.091369 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.192565 kubelet[2117]: E1002 20:37:51.192452 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.292849 kubelet[2117]: E1002 20:37:51.292814 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.392895 kubelet[2117]: E1002 20:37:51.392869 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.493364 kubelet[2117]: E1002 20:37:51.493256 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.593713 kubelet[2117]: E1002 20:37:51.593679 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.694194 kubelet[2117]: E1002 20:37:51.694154 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.794548 kubelet[2117]: E1002 20:37:51.794447 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.894866 kubelet[2117]: E1002 20:37:51.894829 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:51.995204 kubelet[2117]: E1002 20:37:51.995135 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.095649 kubelet[2117]: E1002 20:37:52.095538 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.196151 kubelet[2117]: E1002 20:37:52.196108 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.295993 kubelet[2117]: I1002 20:37:52.295965 2117 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:52.296179 kubelet[2117]: E1002 20:37:52.296159 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.397060 kubelet[2117]: E1002 20:37:52.396983 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.497363 kubelet[2117]: E1002 20:37:52.497320 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.598129 kubelet[2117]: E1002 20:37:52.598093 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.698750 kubelet[2117]: E1002 20:37:52.698641 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.799038 kubelet[2117]: E1002 20:37:52.798996 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.899430 kubelet[2117]: E1002 20:37:52.899389 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:52.999864 kubelet[2117]: E1002 20:37:52.999739 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.055308 kernel: kauditd_printk_skb: 622 callbacks suppressed Oct 2 20:37:53.055442 kernel: audit: type=1400 audit(1696279073.043:716): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.043000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.043000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40003f55a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:53.099924 kubelet[2117]: E1002 20:37:53.099890 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.107956 kernel: audit: type=1300 audit(1696279073.043:716): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40003f55a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:53.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.142045 kernel: audit: type=1327 audit(1696279073.043:716): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.054000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.171052 kernel: audit: type=1400 audit(1696279073.054:717): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.054000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000cd4090 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:53.200854 kubelet[2117]: E1002 20:37:53.200818 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.204672 kernel: audit: type=1300 audit(1696279073.054:717): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000cd4090 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:53.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.234558 kernel: audit: type=1327 audit(1696279073.054:717): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.302053 kubelet[2117]: E1002 20:37:53.301938 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.402728 kubelet[2117]: E1002 20:37:53.402699 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.503732 kubelet[2117]: E1002 20:37:53.503696 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.604321 kubelet[2117]: E1002 20:37:53.604295 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.705238 kubelet[2117]: E1002 20:37:53.705200 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.805945 kubelet[2117]: E1002 20:37:53.805907 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:53.906773 kubelet[2117]: E1002 20:37:53.906678 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.007514 kubelet[2117]: E1002 20:37:54.007480 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.108311 kubelet[2117]: E1002 20:37:54.108273 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.209578 kubelet[2117]: E1002 20:37:54.209485 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.291000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.320208 kubelet[2117]: E1002 20:37:54.320176 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.320866 kubelet[2117]: E1002 20:37:54.320839 2117 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:37:54.300000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.349990 kernel: audit: type=1400 audit(1696279074.291:718): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.350091 kernel: audit: type=1400 audit(1696279074.300:719): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.300000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=47 a1=4007ed5a70 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.390279 kernel: audit: type=1300 audit(1696279074.300:719): arch=c00000b7 syscall=27 success=no exit=-13 a0=47 a1=4007ed5a70 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.300000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.418421 kernel: audit: type=1327 audit(1696279074.300:719): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.422972 kubelet[2117]: E1002 20:37:54.422940 2117 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-f31f601c03\" not found" Oct 2 20:37:54.315000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.315000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=54 a1=4007f847e0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.291000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4007e28780 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.291000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.319000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.319000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4002a87a20 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.443000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.443000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4002a95ce0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.443000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.443000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:54.443000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=40080d0660 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:37:54.443000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:54.462409 kubelet[2117]: E1002 20:37:54.462334 2117 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-f31f601c03\" not found" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:54.476889 kubelet[2117]: I1002 20:37:54.476864 2117 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:55.175160 kubelet[2117]: I1002 20:37:55.175120 2117 apiserver.go:52] "Watching apiserver" Oct 2 20:37:55.235333 kubelet[2117]: I1002 20:37:55.235292 2117 reconciler.go:169] "Reconciler: start to sync state" Oct 2 20:37:56.967572 systemd[1]: Reloading. Oct 2 20:37:57.060695 /usr/lib/systemd/system-generators/torcx-generator[2444]: time="2023-10-02T20:37:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:57.064426 /usr/lib/systemd/system-generators/torcx-generator[2444]: time="2023-10-02T20:37:57Z" level=info msg="torcx already run" Oct 2 20:37:57.173690 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:57.173709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:57.191768 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit: BPF prog-id=92 op=LOAD Oct 2 20:37:57.283000 audit: BPF prog-id=53 op=UNLOAD Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit: BPF prog-id=93 op=LOAD Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.283000 audit: BPF prog-id=94 op=LOAD Oct 2 20:37:57.283000 audit: BPF prog-id=54 op=UNLOAD Oct 2 20:37:57.283000 audit: BPF prog-id=55 op=UNLOAD Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.284000 audit: BPF prog-id=95 op=LOAD Oct 2 20:37:57.284000 audit: BPF prog-id=72 op=UNLOAD Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit: BPF prog-id=96 op=LOAD Oct 2 20:37:57.286000 audit: BPF prog-id=56 op=UNLOAD Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.286000 audit: BPF prog-id=97 op=LOAD Oct 2 20:37:57.286000 audit: BPF prog-id=68 op=UNLOAD Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit: BPF prog-id=98 op=LOAD Oct 2 20:37:57.287000 audit: BPF prog-id=57 op=UNLOAD Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit: BPF prog-id=99 op=LOAD Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit: BPF prog-id=100 op=LOAD Oct 2 20:37:57.288000 audit: BPF prog-id=58 op=UNLOAD Oct 2 20:37:57.288000 audit: BPF prog-id=59 op=UNLOAD Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit: BPF prog-id=101 op=LOAD Oct 2 20:37:57.289000 audit: BPF prog-id=60 op=UNLOAD Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit: BPF prog-id=102 op=LOAD Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit: BPF prog-id=103 op=LOAD Oct 2 20:37:57.289000 audit: BPF prog-id=61 op=UNLOAD Oct 2 20:37:57.289000 audit: BPF prog-id=62 op=UNLOAD Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.289000 audit: BPF prog-id=104 op=LOAD Oct 2 20:37:57.289000 audit: BPF prog-id=63 op=UNLOAD Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.291000 audit: BPF prog-id=105 op=LOAD Oct 2 20:37:57.291000 audit: BPF prog-id=64 op=UNLOAD Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.292000 audit: BPF prog-id=106 op=LOAD Oct 2 20:37:57.292000 audit: BPF prog-id=88 op=UNLOAD Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.293000 audit: BPF prog-id=107 op=LOAD Oct 2 20:37:57.293000 audit: BPF prog-id=84 op=UNLOAD Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit: BPF prog-id=108 op=LOAD Oct 2 20:37:57.295000 audit: BPF prog-id=65 op=UNLOAD Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.295000 audit: BPF prog-id=109 op=LOAD Oct 2 20:37:57.295000 audit: BPF prog-id=76 op=UNLOAD Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit: BPF prog-id=110 op=LOAD Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit: BPF prog-id=111 op=LOAD Oct 2 20:37:57.296000 audit: BPF prog-id=66 op=UNLOAD Oct 2 20:37:57.296000 audit: BPF prog-id=67 op=UNLOAD Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.297000 audit: BPF prog-id=112 op=LOAD Oct 2 20:37:57.297000 audit: BPF prog-id=80 op=UNLOAD Oct 2 20:37:57.313118 systemd[1]: Stopping kubelet.service... Oct 2 20:37:57.333776 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 20:37:57.333990 systemd[1]: Stopped kubelet.service. Oct 2 20:37:57.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:57.334059 systemd[1]: kubelet.service: Consumed 1.086s CPU time. Oct 2 20:37:57.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:57.336645 systemd[1]: Started kubelet.service. Oct 2 20:37:57.423888 kubelet[2504]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:37:57.423888 kubelet[2504]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:57.423888 kubelet[2504]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:57.424248 kubelet[2504]: I1002 20:37:57.423967 2504 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:57.425230 kubelet[2504]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 20:37:57.425230 kubelet[2504]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:57.425230 kubelet[2504]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:57.430099 kubelet[2504]: I1002 20:37:57.430070 2504 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 20:37:57.430257 kubelet[2504]: I1002 20:37:57.430247 2504 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:57.431238 kubelet[2504]: I1002 20:37:57.431217 2504 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 20:37:57.434294 kubelet[2504]: I1002 20:37:57.434251 2504 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 20:37:57.435608 kubelet[2504]: I1002 20:37:57.435577 2504 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:57.437940 kubelet[2504]: W1002 20:37:57.437922 2504 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:57.438685 kubelet[2504]: I1002 20:37:57.438666 2504 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:57.439023 kubelet[2504]: I1002 20:37:57.439010 2504 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:57.439228 kubelet[2504]: I1002 20:37:57.439214 2504 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 20:37:57.439441 kubelet[2504]: I1002 20:37:57.439427 2504 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:57.439520 kubelet[2504]: I1002 20:37:57.439511 2504 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 20:37:57.439627 kubelet[2504]: I1002 20:37:57.439617 2504 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:57.442655 kubelet[2504]: I1002 20:37:57.442635 2504 kubelet.go:381] "Attempting to sync node with API server" Oct 2 20:37:57.442764 kubelet[2504]: I1002 20:37:57.442753 2504 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:57.442833 kubelet[2504]: I1002 20:37:57.442824 2504 kubelet.go:281] "Adding apiserver pod source" Oct 2 20:37:57.442892 kubelet[2504]: I1002 20:37:57.442883 2504 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:57.449303 kubelet[2504]: I1002 20:37:57.447721 2504 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:57.449303 kubelet[2504]: I1002 20:37:57.448284 2504 server.go:1175] "Started kubelet" Oct 2 20:37:57.451000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.451000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:57.451000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000becae0 a1=4000bd6618 a2=4000becab0 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:57.451000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:57.452405 kubelet[2504]: I1002 20:37:57.452389 2504 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:57.452000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.452000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:57.452000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bee2c0 a1=4000bd6630 a2=4000becb70 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:57.452000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:57.452681 kubelet[2504]: I1002 20:37:57.452668 2504 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:57.452836 kubelet[2504]: I1002 20:37:57.452827 2504 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:57.454657 kubelet[2504]: I1002 20:37:57.454642 2504 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:57.455425 kubelet[2504]: I1002 20:37:57.455410 2504 server.go:438] "Adding debug handlers to kubelet server" Oct 2 20:37:57.458383 kubelet[2504]: I1002 20:37:57.458366 2504 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 20:37:57.458895 kubelet[2504]: I1002 20:37:57.458878 2504 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 20:37:57.462947 kubelet[2504]: E1002 20:37:57.462906 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:37:57.490307 kubelet[2504]: E1002 20:37:57.486426 2504 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:57.490307 kubelet[2504]: E1002 20:37:57.486457 2504 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:57.494433 kubelet[2504]: I1002 20:37:57.494416 2504 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:57.554801 kubelet[2504]: I1002 20:37:57.554720 2504 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:57.554969 kubelet[2504]: I1002 20:37:57.554957 2504 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 20:37:57.555032 kubelet[2504]: I1002 20:37:57.555024 2504 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 20:37:57.555127 kubelet[2504]: E1002 20:37:57.555119 2504 kubelet.go:2034] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:37:57.574207 kubelet[2504]: I1002 20:37:57.574185 2504 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.598528 kubelet[2504]: I1002 20:37:57.591756 2504 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.598528 kubelet[2504]: I1002 20:37:57.591840 2504 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.641809 kubelet[2504]: I1002 20:37:57.641774 2504 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 20:37:57.641809 kubelet[2504]: I1002 20:37:57.641798 2504 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:57.641809 kubelet[2504]: I1002 20:37:57.641817 2504 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:57.642005 kubelet[2504]: I1002 20:37:57.641985 2504 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 20:37:57.642005 kubelet[2504]: I1002 20:37:57.642004 2504 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 20:37:57.642075 kubelet[2504]: I1002 20:37:57.642012 2504 policy_none.go:49] "None policy: Start" Oct 2 20:37:57.645698 kubelet[2504]: I1002 20:37:57.645670 2504 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 20:37:57.645698 kubelet[2504]: I1002 20:37:57.645700 2504 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:57.645843 kubelet[2504]: I1002 20:37:57.645825 2504 state_mem.go:75] "Updated machine memory state" Oct 2 20:37:57.653462 kubelet[2504]: I1002 20:37:57.653446 2504 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:57.652000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:57.652000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:57.652000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001352660 a1=400134bd28 a2=4001352630 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:57.652000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:57.654026 kubelet[2504]: I1002 20:37:57.653926 2504 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:57.654438 kubelet[2504]: I1002 20:37:57.654425 2504 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:57.655724 kubelet[2504]: I1002 20:37:57.655681 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:57.655793 kubelet[2504]: I1002 20:37:57.655766 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:57.655820 kubelet[2504]: I1002 20:37:57.655797 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:37:57.664091 kubelet[2504]: I1002 20:37:57.664073 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.664642 kubelet[2504]: I1002 20:37:57.664626 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.664785 kubelet[2504]: I1002 20:37:57.664773 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b3756fc2909a22add2550263fb5c7660-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" (UID: \"b3756fc2909a22add2550263fb5c7660\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665074 kubelet[2504]: I1002 20:37:57.665062 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e7629d363a2feee76e2650394333c0be-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-f31f601c03\" (UID: \"e7629d363a2feee76e2650394333c0be\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665208 kubelet[2504]: I1002 20:37:57.665198 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665324 kubelet[2504]: I1002 20:37:57.665314 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665437 kubelet[2504]: I1002 20:37:57.665427 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665558 kubelet[2504]: I1002 20:37:57.665549 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:57.665667 kubelet[2504]: I1002 20:37:57.665656 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be010720696b682266d9c20fc68784c0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" (UID: \"be010720696b682266d9c20fc68784c0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:58.456882 kubelet[2504]: I1002 20:37:58.456847 2504 apiserver.go:52] "Watching apiserver" Oct 2 20:37:58.571763 kubelet[2504]: I1002 20:37:58.571720 2504 reconciler.go:169] "Reconciler: start to sync state" Oct 2 20:37:58.664835 kubelet[2504]: E1002 20:37:58.664808 2504 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-f31f601c03\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:58.723000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.730337 kernel: kauditd_printk_skb: 272 callbacks suppressed Oct 2 20:37:58.730423 kernel: audit: type=1400 audit(1696279078.723:973): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.734000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.774280 kernel: audit: type=1400 audit(1696279078.734:974): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.734000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111aac0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.803776 kernel: audit: type=1300 audit(1696279078.734:974): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111aac0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.803889 kernel: audit: type=1327 audit(1696279078.734:974): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.734000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.854784 kernel: audit: type=1400 audit(1696279078.734:975): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.854930 kernel: audit: type=1300 audit(1696279078.734:975): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111ab20 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.734000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111ab20 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.907059 kernel: audit: type=1327 audit(1696279078.734:975): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.739000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.932429 kernel: audit: type=1400 audit(1696279078.739:976): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:58.739000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111ae40 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.970135 kernel: audit: type=1300 audit(1696279078.739:976): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400111ae40 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.995996 kernel: audit: type=1327 audit(1696279078.739:976): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:58.723000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f474a0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:58.723000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:59.102935 kubelet[2504]: E1002 20:37:59.102903 2504 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-f31f601c03\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:59.369481 kubelet[2504]: E1002 20:37:59.369443 2504 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-f31f601c03\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-f31f601c03" Oct 2 20:37:59.873000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 20:37:59.873000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b81d00 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:37:59.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:02.655652 kubelet[2504]: E1002 20:38:02.655622 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:02.925913 sudo[1714]: pam_unix(sudo:session): session closed for user root Oct 2 20:38:02.926000 audit[1714]: USER_END pid=1714 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:02.926000 audit[1714]: CRED_DISP pid=1714 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:02.997467 sshd[1711]: pam_unix(sshd:session): session closed for user core Oct 2 20:38:02.998000 audit[1711]: USER_END pid=1711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:02.998000 audit[1711]: CRED_DISP pid=1711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:03.001348 systemd-logind[1338]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:38:03.001352 systemd[1]: sshd@6-10.200.20.37:22-10.200.12.6:41208.service: Deactivated successfully. Oct 2 20:38:03.002125 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:38:03.002328 systemd[1]: session-9.scope: Consumed 6.016s CPU time. Oct 2 20:38:03.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.37:22-10.200.12.6:41208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.002917 systemd-logind[1338]: Removed session 9. Oct 2 20:38:07.656921 kubelet[2504]: E1002 20:38:07.656886 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:11.606732 kubelet[2504]: I1002 20:38:11.606701 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:11.612095 systemd[1]: Created slice kubepods-besteffort-pod573ce5f0_0586_4ab6_867e_26ea67bb7064.slice. Oct 2 20:38:11.649879 kubelet[2504]: I1002 20:38:11.649835 2504 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 20:38:11.650348 env[1352]: time="2023-10-02T20:38:11.650305666Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:38:11.650616 kubelet[2504]: I1002 20:38:11.650499 2504 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 20:38:11.650790 kubelet[2504]: E1002 20:38:11.650768 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:11.651080 kubelet[2504]: I1002 20:38:11.651054 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/573ce5f0-0586-4ab6-867e-26ea67bb7064-kube-proxy\") pod \"kube-proxy-kpntx\" (UID: \"573ce5f0-0586-4ab6-867e-26ea67bb7064\") " pod="kube-system/kube-proxy-kpntx" Oct 2 20:38:11.651144 kubelet[2504]: I1002 20:38:11.651085 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/573ce5f0-0586-4ab6-867e-26ea67bb7064-xtables-lock\") pod \"kube-proxy-kpntx\" (UID: \"573ce5f0-0586-4ab6-867e-26ea67bb7064\") " pod="kube-system/kube-proxy-kpntx" Oct 2 20:38:11.651144 kubelet[2504]: I1002 20:38:11.651107 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/573ce5f0-0586-4ab6-867e-26ea67bb7064-lib-modules\") pod \"kube-proxy-kpntx\" (UID: \"573ce5f0-0586-4ab6-867e-26ea67bb7064\") " pod="kube-system/kube-proxy-kpntx" Oct 2 20:38:11.651144 kubelet[2504]: I1002 20:38:11.651129 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zhqp\" (UniqueName: \"kubernetes.io/projected/573ce5f0-0586-4ab6-867e-26ea67bb7064-kube-api-access-5zhqp\") pod \"kube-proxy-kpntx\" (UID: \"573ce5f0-0586-4ab6-867e-26ea67bb7064\") " pod="kube-system/kube-proxy-kpntx" Oct 2 20:38:11.802666 kubelet[2504]: I1002 20:38:11.802625 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:11.807594 systemd[1]: Created slice kubepods-besteffort-pod2c91f9ea_422f_45e7_b397_3dc4f44b3c59.slice. Oct 2 20:38:11.852759 kubelet[2504]: I1002 20:38:11.852726 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7z7s2\" (UniqueName: \"kubernetes.io/projected/2c91f9ea-422f-45e7-b397-3dc4f44b3c59-kube-api-access-7z7s2\") pod \"tigera-operator-64db64cb98-9j4bx\" (UID: \"2c91f9ea-422f-45e7-b397-3dc4f44b3c59\") " pod="tigera-operator/tigera-operator-64db64cb98-9j4bx" Oct 2 20:38:11.852905 kubelet[2504]: I1002 20:38:11.852772 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2c91f9ea-422f-45e7-b397-3dc4f44b3c59-var-lib-calico\") pod \"tigera-operator-64db64cb98-9j4bx\" (UID: \"2c91f9ea-422f-45e7-b397-3dc4f44b3c59\") " pod="tigera-operator/tigera-operator-64db64cb98-9j4bx" Oct 2 20:38:11.919207 env[1352]: time="2023-10-02T20:38:11.919093774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kpntx,Uid:573ce5f0-0586-4ab6-867e-26ea67bb7064,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:11.951341 env[1352]: time="2023-10-02T20:38:11.951187927Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:11.951341 env[1352]: time="2023-10-02T20:38:11.951227051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:11.951341 env[1352]: time="2023-10-02T20:38:11.951237332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:11.953073 env[1352]: time="2023-10-02T20:38:11.951719824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/262d1641009b36d6f8a7f249233cb1ce20bd8f74b90bf01383c60d4d64e85497 pid=2615 runtime=io.containerd.runc.v2 Oct 2 20:38:12.006082 systemd[1]: Started cri-containerd-262d1641009b36d6f8a7f249233cb1ce20bd8f74b90bf01383c60d4d64e85497.scope. Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.027080 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 20:38:12.027213 kernel: audit: type=1400 audit(1696279092.021:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060928 kernel: audit: type=1400 audit(1696279092.021:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.061024 kernel: audit: type=1400 audit(1696279092.021:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.097055 kernel: audit: type=1400 audit(1696279092.021:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.116465 kernel: audit: type=1400 audit(1696279092.021:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.116959 env[1352]: time="2023-10-02T20:38:12.116915997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-9j4bx,Uid:2c91f9ea-422f-45e7-b397-3dc4f44b3c59,Namespace:tigera-operator,Attempt:0,}" Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.135407 kernel: audit: type=1400 audit(1696279092.021:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.158808 kernel: audit: type=1400 audit(1696279092.021:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.158911 kernel: audit: type=1400 audit(1696279092.021:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.176768 env[1352]: time="2023-10-02T20:38:12.176726502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kpntx,Uid:573ce5f0-0586-4ab6-867e-26ea67bb7064,Namespace:kube-system,Attempt:0,} returns sandbox id \"262d1641009b36d6f8a7f249233cb1ce20bd8f74b90bf01383c60d4d64e85497\"" Oct 2 20:38:12.192046 kernel: audit: type=1400 audit(1696279092.021:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.192217 kernel: audit: type=1400 audit(1696279092.021:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.192647 env[1352]: time="2023-10-02T20:38:12.192611967Z" level=info msg="CreateContainer within sandbox \"262d1641009b36d6f8a7f249233cb1ce20bd8f74b90bf01383c60d4d64e85497\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:38:12.021000 audit: BPF prog-id=113 op=LOAD Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236326431363431303039623336643666386137663234393233336362 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236326431363431303039623336643666386137663234393233336362 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.038000 audit: BPF prog-id=114 op=LOAD Oct 2 20:38:12.038000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236326431363431303039623336643666386137663234393233336362 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.043000 audit: BPF prog-id=115 op=LOAD Oct 2 20:38:12.043000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236326431363431303039623336643666386137663234393233336362 Oct 2 20:38:12.060000 audit: BPF prog-id=115 op=UNLOAD Oct 2 20:38:12.060000 audit: BPF prog-id=114 op=UNLOAD Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.060000 audit: BPF prog-id=116 op=LOAD Oct 2 20:38:12.060000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236326431363431303039623336643666386137663234393233336362 Oct 2 20:38:12.243721 env[1352]: time="2023-10-02T20:38:12.243632952Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:12.243721 env[1352]: time="2023-10-02T20:38:12.243687717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:12.243721 env[1352]: time="2023-10-02T20:38:12.243697798Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:12.244185 env[1352]: time="2023-10-02T20:38:12.244145445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a pid=2656 runtime=io.containerd.runc.v2 Oct 2 20:38:12.254438 env[1352]: time="2023-10-02T20:38:12.254394159Z" level=info msg="CreateContainer within sandbox \"262d1641009b36d6f8a7f249233cb1ce20bd8f74b90bf01383c60d4d64e85497\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"889a138127543c558e38447b60e9e23cefe8167268ca702781b151c4bd087702\"" Oct 2 20:38:12.257046 env[1352]: time="2023-10-02T20:38:12.256938825Z" level=info msg="StartContainer for \"889a138127543c558e38447b60e9e23cefe8167268ca702781b151c4bd087702\"" Oct 2 20:38:12.261343 systemd[1]: Started cri-containerd-dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a.scope. Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.279000 audit: BPF prog-id=117 op=LOAD Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2656 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663534383232633165386235343561636666396435346364396131 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2656 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663534383232633165386235343561636666396435346364396131 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.280000 audit: BPF prog-id=118 op=LOAD Oct 2 20:38:12.280000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2656 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663534383232633165386235343561636666396435346364396131 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.282000 audit: BPF prog-id=119 op=LOAD Oct 2 20:38:12.282000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2656 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663534383232633165386235343561636666396435346364396131 Oct 2 20:38:12.283000 audit: BPF prog-id=119 op=UNLOAD Oct 2 20:38:12.283000 audit: BPF prog-id=118 op=UNLOAD Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.283000 audit: BPF prog-id=120 op=LOAD Oct 2 20:38:12.283000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2656 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663534383232633165386235343561636666396435346364396131 Oct 2 20:38:12.287792 systemd[1]: Started cri-containerd-889a138127543c558e38447b60e9e23cefe8167268ca702781b151c4bd087702.scope. Oct 2 20:38:12.313000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.313000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2615 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396131333831323735343363353538653338343437623630653965 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit: BPF prog-id=121 op=LOAD Oct 2 20:38:12.314000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2615 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396131333831323735343363353538653338343437623630653965 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.314000 audit: BPF prog-id=122 op=LOAD Oct 2 20:38:12.314000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2615 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396131333831323735343363353538653338343437623630653965 Oct 2 20:38:12.315000 audit: BPF prog-id=122 op=UNLOAD Oct 2 20:38:12.315000 audit: BPF prog-id=121 op=UNLOAD Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.315000 audit: BPF prog-id=123 op=LOAD Oct 2 20:38:12.315000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2615 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396131333831323735343363353538653338343437623630653965 Oct 2 20:38:12.322987 env[1352]: time="2023-10-02T20:38:12.322951581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-9j4bx,Uid:2c91f9ea-422f-45e7-b397-3dc4f44b3c59,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a\"" Oct 2 20:38:12.325684 env[1352]: time="2023-10-02T20:38:12.325653984Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 20:38:12.340798 env[1352]: time="2023-10-02T20:38:12.340732284Z" level=info msg="StartContainer for \"889a138127543c558e38447b60e9e23cefe8167268ca702781b151c4bd087702\" returns successfully" Oct 2 20:38:12.419035 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 20:38:12.419166 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 20:38:12.419195 kernel: IPVS: ipvs loaded. Oct 2 20:38:12.434294 kernel: IPVS: [rr] scheduler registered. Oct 2 20:38:12.460298 kernel: IPVS: [wrr] scheduler registered. Oct 2 20:38:12.471305 kernel: IPVS: [sh] scheduler registered. Oct 2 20:38:12.562000 audit[2756]: NETFILTER_CFG table=mangle:62 family=2 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.562000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc04f0d0 a2=0 a3=ffff831f26c0 items=0 ppid=2702 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:12.565000 audit[2758]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.565000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0b92690 a2=0 a3=ffffb353c6c0 items=0 ppid=2702 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:12.569000 audit[2760]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.569000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6dca300 a2=0 a3=ffffb60046c0 items=0 ppid=2702 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:12.572000 audit[2757]: NETFILTER_CFG table=mangle:65 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.572000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea0ccd40 a2=0 a3=ffff95f4a6c0 items=0 ppid=2702 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:12.574000 audit[2762]: NETFILTER_CFG table=nat:66 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.574000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc163f6b0 a2=0 a3=ffffbe2fa6c0 items=0 ppid=2702 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:12.575000 audit[2763]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.575000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeba52f80 a2=0 a3=ffff925fe6c0 items=0 ppid=2702 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:12.658232 kubelet[2504]: E1002 20:38:12.658199 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:12.667000 audit[2764]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.667000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc9a58470 a2=0 a3=ffff849316c0 items=0 ppid=2702 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:12.672000 audit[2766]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.672000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd1ed0000 a2=0 a3=ffff9e3f96c0 items=0 ppid=2702 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:38:12.678000 audit[2769]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.678000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff780cfa0 a2=0 a3=ffff986776c0 items=0 ppid=2702 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:38:12.680000 audit[2770]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.680000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3306a90 a2=0 a3=ffff835626c0 items=0 ppid=2702 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:12.683000 audit[2772]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.683000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe07a990 a2=0 a3=ffff9040c6c0 items=0 ppid=2702 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:12.685000 audit[2773]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.685000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd49db640 a2=0 a3=ffffaab4f6c0 items=0 ppid=2702 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:12.688000 audit[2775]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.688000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd0a4c320 a2=0 a3=ffff86b0f6c0 items=0 ppid=2702 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:12.694000 audit[2778]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.694000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd7a5a830 a2=0 a3=ffff8a3396c0 items=0 ppid=2702 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:38:12.696000 audit[2779]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.696000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3753ec0 a2=0 a3=ffff8ddbc6c0 items=0 ppid=2702 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:12.700000 audit[2781]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.700000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff52e2980 a2=0 a3=ffffa9d436c0 items=0 ppid=2702 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:12.702000 audit[2782]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.702000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc4c72a0 a2=0 a3=ffffb25ea6c0 items=0 ppid=2702 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:12.706000 audit[2784]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.706000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8ec66a0 a2=0 a3=ffffa9ba96c0 items=0 ppid=2702 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:12.711000 audit[2787]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.711000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd04d9610 a2=0 a3=ffff8a8646c0 items=0 ppid=2702 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:12.717000 audit[2790]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.717000 audit[2790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9be6fc0 a2=0 a3=ffff86f246c0 items=0 ppid=2702 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:12.718000 audit[2791]: NETFILTER_CFG table=nat:82 family=2 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.718000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6310ed0 a2=0 a3=ffffb6b246c0 items=0 ppid=2702 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:12.722000 audit[2793]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.722000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdef109b0 a2=0 a3=ffffb15986c0 items=0 ppid=2702 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:12.726000 audit[2796]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:12.726000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed34ec50 a2=0 a3=ffffad4596c0 items=0 ppid=2702 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:12.771000 audit[2800]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:12.771000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffdd29a8b0 a2=0 a3=ffff7fed56c0 items=0 ppid=2702 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:12.791000 audit[2800]: NETFILTER_CFG table=nat:86 family=2 entries=17 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:12.791000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdd29a8b0 a2=0 a3=ffff7fed56c0 items=0 ppid=2702 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:12.793000 audit[2803]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.793000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe7ec7150 a2=0 a3=ffffbe8896c0 items=0 ppid=2702 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:12.797000 audit[2805]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.797000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe9987650 a2=0 a3=ffff8c44e6c0 items=0 ppid=2702 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:38:12.802000 audit[2808]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.802000 audit[2808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffe8d80e0 a2=0 a3=ffffa16af6c0 items=0 ppid=2702 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:38:12.804000 audit[2809]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.804000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca4eed70 a2=0 a3=ffff8b00e6c0 items=0 ppid=2702 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:12.808000 audit[2811]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.808000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff37f8740 a2=0 a3=ffff902226c0 items=0 ppid=2702 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:12.810000 audit[2812]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.810000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef940690 a2=0 a3=ffffb60546c0 items=0 ppid=2702 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:12.813000 audit[2814]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.813000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe893eb20 a2=0 a3=ffffb40e06c0 items=0 ppid=2702 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:38:12.818000 audit[2817]: NETFILTER_CFG table=filter:94 family=10 entries=2 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.818000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff0d09a70 a2=0 a3=ffff8c1406c0 items=0 ppid=2702 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:12.820000 audit[2818]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.820000 audit[2818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9da7270 a2=0 a3=ffffbaad76c0 items=0 ppid=2702 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:12.824000 audit[2820]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.824000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4e84640 a2=0 a3=ffff7fba46c0 items=0 ppid=2702 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:12.826000 audit[2821]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_chain pid=2821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.826000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff868c330 a2=0 a3=ffff949ab6c0 items=0 ppid=2702 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:12.829000 audit[2823]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.829000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7f0f630 a2=0 a3=ffffa35ed6c0 items=0 ppid=2702 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:12.835000 audit[2826]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.835000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe4e220b0 a2=0 a3=ffff973cc6c0 items=0 ppid=2702 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:12.839000 audit[2829]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.839000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff14b7c0 a2=0 a3=ffffa6dc36c0 items=0 ppid=2702 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:38:12.841000 audit[2830]: NETFILTER_CFG table=nat:101 family=10 entries=1 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.841000 audit[2830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffece051f0 a2=0 a3=ffff931776c0 items=0 ppid=2702 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:12.844000 audit[2832]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.844000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffec5038d0 a2=0 a3=ffff8aa016c0 items=0 ppid=2702 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:12.849000 audit[2835]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:12.849000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd9811a40 a2=0 a3=ffffb56076c0 items=0 ppid=2702 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:12.856000 audit[2839]: NETFILTER_CFG table=filter:104 family=10 entries=3 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:12.856000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff4ca5f10 a2=0 a3=ffffacd536c0 items=0 ppid=2702 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.856000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:12.857000 audit[2839]: NETFILTER_CFG table=nat:105 family=10 entries=10 op=nft_register_chain pid=2839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:12.857000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1860 a0=3 a1=fffff4ca5f10 a2=0 a3=ffffacd536c0 items=0 ppid=2702 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.857000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:13.740990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3644923516.mount: Deactivated successfully. Oct 2 20:38:14.455457 env[1352]: time="2023-10-02T20:38:14.455408584Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.460435 env[1352]: time="2023-10-02T20:38:14.460402726Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.463766 env[1352]: time="2023-10-02T20:38:14.463741182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.468194 env[1352]: time="2023-10-02T20:38:14.468165947Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.468904 env[1352]: time="2023-10-02T20:38:14.468872498Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 20:38:14.471336 env[1352]: time="2023-10-02T20:38:14.471300862Z" level=info msg="CreateContainer within sandbox \"dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 20:38:14.491395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount871075727.mount: Deactivated successfully. Oct 2 20:38:14.495795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214120450.mount: Deactivated successfully. Oct 2 20:38:14.506147 env[1352]: time="2023-10-02T20:38:14.506099882Z" level=info msg="CreateContainer within sandbox \"dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85\"" Oct 2 20:38:14.506798 env[1352]: time="2023-10-02T20:38:14.506761549Z" level=info msg="StartContainer for \"ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85\"" Oct 2 20:38:14.527716 systemd[1]: Started cri-containerd-ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85.scope. Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.547000 audit: BPF prog-id=124 op=LOAD Oct 2 20:38:14.548000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.548000 audit[2847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2656 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565333334366461633736363634306535393965626561383631323666 Oct 2 20:38:14.548000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.548000 audit[2847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2656 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565333334366461633736363634306535393965626561383631323666 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit: BPF prog-id=125 op=LOAD Oct 2 20:38:14.549000 audit[2847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2656 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565333334366461633736363634306535393965626561383631323666 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.549000 audit: BPF prog-id=126 op=LOAD Oct 2 20:38:14.549000 audit[2847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2656 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565333334366461633736363634306535393965626561383631323666 Oct 2 20:38:14.550000 audit: BPF prog-id=126 op=UNLOAD Oct 2 20:38:14.550000 audit: BPF prog-id=125 op=UNLOAD Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.550000 audit: BPF prog-id=127 op=LOAD Oct 2 20:38:14.550000 audit[2847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2656 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565333334366461633736363634306535393965626561383631323666 Oct 2 20:38:14.569961 env[1352]: time="2023-10-02T20:38:14.569877296Z" level=info msg="StartContainer for \"ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85\" returns successfully" Oct 2 20:38:17.162000 audit[2902]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.168953 kernel: kauditd_printk_skb: 336 callbacks suppressed Oct 2 20:38:17.169076 kernel: audit: type=1325 audit(1696279097.162:1087): table=filter:106 family=2 entries=13 op=nft_register_rule pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.162000 audit[2902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd09f9c00 a2=0 a3=ffffbd8b96c0 items=0 ppid=2702 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.210449 kernel: audit: type=1300 audit(1696279097.162:1087): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd09f9c00 a2=0 a3=ffffbd8b96c0 items=0 ppid=2702 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.224892 kernel: audit: type=1327 audit(1696279097.162:1087): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.163000 audit[2902]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.244134 kernel: audit: type=1325 audit(1696279097.163:1088): table=nat:107 family=2 entries=20 op=nft_register_rule pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.163000 audit[2902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd09f9c00 a2=0 a3=ffffbd8b96c0 items=0 ppid=2702 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.275871 kernel: audit: type=1300 audit(1696279097.163:1088): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd09f9c00 a2=0 a3=ffffbd8b96c0 items=0 ppid=2702 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.289595 kernel: audit: type=1327 audit(1696279097.163:1088): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.309000 audit[2928]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.309000 audit[2928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffffa714cc0 a2=0 a3=ffff998396c0 items=0 ppid=2702 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.352946 kernel: audit: type=1325 audit(1696279097.309:1089): table=filter:108 family=2 entries=14 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.353086 kernel: audit: type=1300 audit(1696279097.309:1089): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffffa714cc0 a2=0 a3=ffff998396c0 items=0 ppid=2702 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.353112 kernel: audit: type=1327 audit(1696279097.309:1089): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.310000 audit[2928]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.382455 kernel: audit: type=1325 audit(1696279097.310:1090): table=nat:109 family=2 entries=20 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:17.310000 audit[2928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffffa714cc0 a2=0 a3=ffff998396c0 items=0 ppid=2702 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:17.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:17.393297 kubelet[2504]: I1002 20:38:17.393252 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:17.398733 systemd[1]: Created slice kubepods-besteffort-pod0d6be112_f643_4b19_a4ef_39a1afedd824.slice. Oct 2 20:38:17.481160 kubelet[2504]: I1002 20:38:17.481062 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:17.486559 kubelet[2504]: I1002 20:38:17.486540 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0d6be112-f643-4b19-a4ef-39a1afedd824-tigera-ca-bundle\") pod \"calico-typha-f9c8cfb98-lsg47\" (UID: \"0d6be112-f643-4b19-a4ef-39a1afedd824\") " pod="calico-system/calico-typha-f9c8cfb98-lsg47" Oct 2 20:38:17.486696 kubelet[2504]: I1002 20:38:17.486685 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0d6be112-f643-4b19-a4ef-39a1afedd824-typha-certs\") pod \"calico-typha-f9c8cfb98-lsg47\" (UID: \"0d6be112-f643-4b19-a4ef-39a1afedd824\") " pod="calico-system/calico-typha-f9c8cfb98-lsg47" Oct 2 20:38:17.486808 systemd[1]: Created slice kubepods-besteffort-podaa02695f_829b_4071_80a7_494bc141d834.slice. Oct 2 20:38:17.489138 kubelet[2504]: I1002 20:38:17.489120 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4ngr6\" (UniqueName: \"kubernetes.io/projected/0d6be112-f643-4b19-a4ef-39a1afedd824-kube-api-access-4ngr6\") pod \"calico-typha-f9c8cfb98-lsg47\" (UID: \"0d6be112-f643-4b19-a4ef-39a1afedd824\") " pod="calico-system/calico-typha-f9c8cfb98-lsg47" Oct 2 20:38:17.590391 kubelet[2504]: I1002 20:38:17.590364 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-lib-modules\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.590602 kubelet[2504]: I1002 20:38:17.590591 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-policysync\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.590706 kubelet[2504]: I1002 20:38:17.590697 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aa02695f-829b-4071-80a7-494bc141d834-tigera-ca-bundle\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.590835 kubelet[2504]: I1002 20:38:17.590825 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-cni-bin-dir\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.590946 kubelet[2504]: I1002 20:38:17.590936 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-var-run-calico\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.591050 kubelet[2504]: I1002 20:38:17.591040 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-cni-log-dir\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.591168 kubelet[2504]: I1002 20:38:17.591159 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-xtables-lock\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.591977 kubelet[2504]: I1002 20:38:17.591961 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gt725\" (UniqueName: \"kubernetes.io/projected/aa02695f-829b-4071-80a7-494bc141d834-kube-api-access-gt725\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.592089 kubelet[2504]: I1002 20:38:17.592078 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-flexvol-driver-host\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.592178 kubelet[2504]: I1002 20:38:17.592167 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-var-lib-calico\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.592249 kubelet[2504]: I1002 20:38:17.592240 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/aa02695f-829b-4071-80a7-494bc141d834-cni-net-dir\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.592355 kubelet[2504]: I1002 20:38:17.592344 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/aa02695f-829b-4071-80a7-494bc141d834-node-certs\") pod \"calico-node-5w56m\" (UID: \"aa02695f-829b-4071-80a7-494bc141d834\") " pod="calico-system/calico-node-5w56m" Oct 2 20:38:17.659772 kubelet[2504]: E1002 20:38:17.659732 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:17.706890 kubelet[2504]: E1002 20:38:17.706866 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.707044 kubelet[2504]: W1002 20:38:17.707029 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.707129 kubelet[2504]: E1002 20:38:17.707119 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:17.794925 kubelet[2504]: E1002 20:38:17.794836 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.795071 kubelet[2504]: W1002 20:38:17.795054 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.795148 kubelet[2504]: E1002 20:38:17.795137 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:17.796230 kubelet[2504]: E1002 20:38:17.796214 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.796351 kubelet[2504]: W1002 20:38:17.796338 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.796429 kubelet[2504]: E1002 20:38:17.796419 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:17.809897 kubelet[2504]: E1002 20:38:17.809866 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.810050 kubelet[2504]: W1002 20:38:17.810034 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.810124 kubelet[2504]: E1002 20:38:17.810114 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:17.897608 kubelet[2504]: E1002 20:38:17.897582 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.897815 kubelet[2504]: W1002 20:38:17.897798 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.897912 kubelet[2504]: E1002 20:38:17.897901 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:17.999337 kubelet[2504]: E1002 20:38:17.999305 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:17.999337 kubelet[2504]: W1002 20:38:17.999328 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:17.999503 kubelet[2504]: E1002 20:38:17.999351 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.001902 env[1352]: time="2023-10-02T20:38:18.001855526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f9c8cfb98-lsg47,Uid:0d6be112-f643-4b19-a4ef-39a1afedd824,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:18.040966 env[1352]: time="2023-10-02T20:38:18.040866272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:18.041106 env[1352]: time="2023-10-02T20:38:18.040973802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:18.041106 env[1352]: time="2023-10-02T20:38:18.041001204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:18.041432 env[1352]: time="2023-10-02T20:38:18.041174580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3259c2515496c1ee2455d39e4a237f2a3f93f8a97bc252e2bb6187ecfec0ecad pid=2948 runtime=io.containerd.runc.v2 Oct 2 20:38:18.060704 systemd[1]: Started cri-containerd-3259c2515496c1ee2455d39e4a237f2a3f93f8a97bc252e2bb6187ecfec0ecad.scope. Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.081000 audit: BPF prog-id=128 op=LOAD Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353963323531353439366331656532343535643339653461323337 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353963323531353439366331656532343535643339653461323337 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.082000 audit: BPF prog-id=129 op=LOAD Oct 2 20:38:18.082000 audit[2958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353963323531353439366331656532343535643339653461323337 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.083000 audit: BPF prog-id=130 op=LOAD Oct 2 20:38:18.083000 audit[2958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353963323531353439366331656532343535643339653461323337 Oct 2 20:38:18.084000 audit: BPF prog-id=130 op=UNLOAD Oct 2 20:38:18.084000 audit: BPF prog-id=129 op=UNLOAD Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.084000 audit: BPF prog-id=131 op=LOAD Oct 2 20:38:18.084000 audit[2958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2948 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332353963323531353439366331656532343535643339653461323337 Oct 2 20:38:18.099893 kubelet[2504]: E1002 20:38:18.099863 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:18.099893 kubelet[2504]: W1002 20:38:18.099884 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:18.100039 kubelet[2504]: E1002 20:38:18.099910 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.117958 env[1352]: time="2023-10-02T20:38:18.117918554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f9c8cfb98-lsg47,Uid:0d6be112-f643-4b19-a4ef-39a1afedd824,Namespace:calico-system,Attempt:0,} returns sandbox id \"3259c2515496c1ee2455d39e4a237f2a3f93f8a97bc252e2bb6187ecfec0ecad\"" Oct 2 20:38:18.119390 env[1352]: time="2023-10-02T20:38:18.119365288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 20:38:18.201179 kubelet[2504]: E1002 20:38:18.201143 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:18.201179 kubelet[2504]: W1002 20:38:18.201167 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:18.201179 kubelet[2504]: E1002 20:38:18.201188 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.208879 kubelet[2504]: E1002 20:38:18.208841 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:18.208879 kubelet[2504]: W1002 20:38:18.208867 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:18.208879 kubelet[2504]: E1002 20:38:18.208888 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.390888 env[1352]: time="2023-10-02T20:38:18.390845923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5w56m,Uid:aa02695f-829b-4071-80a7-494bc141d834,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:18.427646 env[1352]: time="2023-10-02T20:38:18.427552334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:18.427646 env[1352]: time="2023-10-02T20:38:18.427599219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:18.427646 env[1352]: time="2023-10-02T20:38:18.427610260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:18.428045 env[1352]: time="2023-10-02T20:38:18.427978814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72 pid=3007 runtime=io.containerd.runc.v2 Oct 2 20:38:18.444972 systemd[1]: Started cri-containerd-57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72.scope. Oct 2 20:38:18.459000 audit[3036]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.459000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe1247680 a2=0 a3=ffffa3f436c0 items=0 ppid=2702 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.461000 audit[3036]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.461000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe1247680 a2=0 a3=ffffa3f436c0 items=0 ppid=2702 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.467000 audit: BPF prog-id=132 op=LOAD Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=3007 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656664613031366631646165643630653334663066613931386265 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3007 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656664613031366631646165643630653334663066613931386265 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.468000 audit: BPF prog-id=133 op=LOAD Oct 2 20:38:18.468000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=3007 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656664613031366631646165643630653334663066613931386265 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.469000 audit: BPF prog-id=134 op=LOAD Oct 2 20:38:18.469000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=3007 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656664613031366631646165643630653334663066613931386265 Oct 2 20:38:18.469000 audit: BPF prog-id=134 op=UNLOAD Oct 2 20:38:18.470000 audit: BPF prog-id=133 op=UNLOAD Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.470000 audit: BPF prog-id=135 op=LOAD Oct 2 20:38:18.470000 audit[3019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=3007 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656664613031366631646165643630653334663066613931386265 Oct 2 20:38:18.485978 env[1352]: time="2023-10-02T20:38:18.485932961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5w56m,Uid:aa02695f-829b-4071-80a7-494bc141d834,Namespace:calico-system,Attempt:0,} returns sandbox id \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\"" Oct 2 20:38:19.397962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2891490220.mount: Deactivated successfully. Oct 2 20:38:20.390490 env[1352]: time="2023-10-02T20:38:20.390444561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.396849 env[1352]: time="2023-10-02T20:38:20.396807130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.400974 env[1352]: time="2023-10-02T20:38:20.400937700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.404929 env[1352]: time="2023-10-02T20:38:20.404876332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.405551 env[1352]: time="2023-10-02T20:38:20.405524150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 20:38:20.406511 env[1352]: time="2023-10-02T20:38:20.406479315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:38:20.409938 env[1352]: time="2023-10-02T20:38:20.409718485Z" level=info msg="CreateContainer within sandbox \"3259c2515496c1ee2455d39e4a237f2a3f93f8a97bc252e2bb6187ecfec0ecad\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 20:38:20.432115 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount275837810.mount: Deactivated successfully. Oct 2 20:38:20.438020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount608668329.mount: Deactivated successfully. Oct 2 20:38:20.447733 env[1352]: time="2023-10-02T20:38:20.447686003Z" level=info msg="CreateContainer within sandbox \"3259c2515496c1ee2455d39e4a237f2a3f93f8a97bc252e2bb6187ecfec0ecad\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"990e2db76fec2516613720206821a92c85741c9a4b219a878de646bb17986f7d\"" Oct 2 20:38:20.449980 env[1352]: time="2023-10-02T20:38:20.448546760Z" level=info msg="StartContainer for \"990e2db76fec2516613720206821a92c85741c9a4b219a878de646bb17986f7d\"" Oct 2 20:38:20.473795 systemd[1]: Started cri-containerd-990e2db76fec2516613720206821a92c85741c9a4b219a878de646bb17986f7d.scope. Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.489000 audit: BPF prog-id=136 op=LOAD Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2948 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939306532646237366665633235313636313337323032303638323161 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2948 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939306532646237366665633235313636313337323032303638323161 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit: BPF prog-id=137 op=LOAD Oct 2 20:38:20.490000 audit[3058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2948 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939306532646237366665633235313636313337323032303638323161 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit: BPF prog-id=138 op=LOAD Oct 2 20:38:20.490000 audit[3058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2948 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939306532646237366665633235313636313337323032303638323161 Oct 2 20:38:20.490000 audit: BPF prog-id=138 op=UNLOAD Oct 2 20:38:20.490000 audit: BPF prog-id=137 op=UNLOAD Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { perfmon } for pid=3058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit[3058]: AVC avc: denied { bpf } for pid=3058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.490000 audit: BPF prog-id=139 op=LOAD Oct 2 20:38:20.490000 audit[3058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2948 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939306532646237366665633235313636313337323032303638323161 Oct 2 20:38:20.511591 env[1352]: time="2023-10-02T20:38:20.511537277Z" level=info msg="StartContainer for \"990e2db76fec2516613720206821a92c85741c9a4b219a878de646bb17986f7d\" returns successfully" Oct 2 20:38:20.677560 kubelet[2504]: E1002 20:38:20.677460 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.677873 kubelet[2504]: W1002 20:38:20.677856 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.677939 kubelet[2504]: E1002 20:38:20.677929 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.679531 kubelet[2504]: E1002 20:38:20.679510 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.679640 kubelet[2504]: W1002 20:38:20.679627 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.679718 kubelet[2504]: E1002 20:38:20.679707 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.680491 kubelet[2504]: E1002 20:38:20.680475 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.680574 kubelet[2504]: W1002 20:38:20.680563 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.680631 kubelet[2504]: E1002 20:38:20.680622 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.680960 kubelet[2504]: E1002 20:38:20.680947 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.681037 kubelet[2504]: W1002 20:38:20.681026 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.681099 kubelet[2504]: E1002 20:38:20.681090 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.681324 kubelet[2504]: E1002 20:38:20.681312 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.681405 kubelet[2504]: W1002 20:38:20.681394 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.681463 kubelet[2504]: E1002 20:38:20.681454 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.681826 kubelet[2504]: E1002 20:38:20.681807 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.681912 kubelet[2504]: W1002 20:38:20.681900 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.681966 kubelet[2504]: E1002 20:38:20.681958 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.682314 kubelet[2504]: E1002 20:38:20.682300 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.682407 kubelet[2504]: W1002 20:38:20.682396 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.682466 kubelet[2504]: E1002 20:38:20.682458 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.682712 kubelet[2504]: E1002 20:38:20.682700 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.682789 kubelet[2504]: W1002 20:38:20.682778 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.682859 kubelet[2504]: E1002 20:38:20.682850 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.683111 kubelet[2504]: E1002 20:38:20.683100 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.683193 kubelet[2504]: W1002 20:38:20.683182 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.683254 kubelet[2504]: E1002 20:38:20.683246 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.683522 kubelet[2504]: E1002 20:38:20.683510 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.683592 kubelet[2504]: W1002 20:38:20.683581 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.683661 kubelet[2504]: E1002 20:38:20.683652 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.684012 kubelet[2504]: E1002 20:38:20.683999 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.684107 kubelet[2504]: W1002 20:38:20.684095 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.684164 kubelet[2504]: E1002 20:38:20.684156 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.684424 kubelet[2504]: E1002 20:38:20.684412 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.684511 kubelet[2504]: W1002 20:38:20.684499 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.684571 kubelet[2504]: E1002 20:38:20.684562 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.707000 audit[3128]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.707000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffde7a99e0 a2=0 a3=ffff955906c0 items=0 ppid=2702 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.708000 audit[3128]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.708000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffde7a99e0 a2=0 a3=ffff955906c0 items=0 ppid=2702 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.716093 kubelet[2504]: E1002 20:38:20.716077 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.716175 kubelet[2504]: W1002 20:38:20.716162 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.716233 kubelet[2504]: E1002 20:38:20.716224 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.717200 kubelet[2504]: E1002 20:38:20.717162 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.717317 kubelet[2504]: W1002 20:38:20.717303 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.717408 kubelet[2504]: E1002 20:38:20.717398 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.717708 kubelet[2504]: E1002 20:38:20.717696 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.717783 kubelet[2504]: W1002 20:38:20.717772 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.717842 kubelet[2504]: E1002 20:38:20.717832 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.718074 kubelet[2504]: E1002 20:38:20.718062 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.718151 kubelet[2504]: W1002 20:38:20.718140 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.718221 kubelet[2504]: E1002 20:38:20.718211 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.718469 kubelet[2504]: E1002 20:38:20.718458 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.718541 kubelet[2504]: W1002 20:38:20.718530 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.718620 kubelet[2504]: E1002 20:38:20.718609 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.718881 kubelet[2504]: E1002 20:38:20.718840 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.718881 kubelet[2504]: W1002 20:38:20.718859 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.718881 kubelet[2504]: E1002 20:38:20.718881 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.719168 kubelet[2504]: E1002 20:38:20.719151 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.719168 kubelet[2504]: W1002 20:38:20.719164 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.719315 kubelet[2504]: E1002 20:38:20.719301 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.719394 kubelet[2504]: E1002 20:38:20.719372 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.719394 kubelet[2504]: W1002 20:38:20.719388 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.719510 kubelet[2504]: E1002 20:38:20.719462 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.720370 kubelet[2504]: E1002 20:38:20.720355 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.720450 kubelet[2504]: W1002 20:38:20.720438 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.720525 kubelet[2504]: E1002 20:38:20.720516 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.720979 kubelet[2504]: E1002 20:38:20.720964 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.721068 kubelet[2504]: W1002 20:38:20.721055 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.721140 kubelet[2504]: E1002 20:38:20.721130 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.721453 kubelet[2504]: E1002 20:38:20.721439 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.721541 kubelet[2504]: W1002 20:38:20.721527 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.721672 kubelet[2504]: E1002 20:38:20.721661 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.721942 kubelet[2504]: E1002 20:38:20.721929 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.722023 kubelet[2504]: W1002 20:38:20.722012 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.722197 kubelet[2504]: E1002 20:38:20.722186 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.722465 kubelet[2504]: E1002 20:38:20.722454 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.722532 kubelet[2504]: W1002 20:38:20.722521 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.722659 kubelet[2504]: E1002 20:38:20.722650 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.722882 kubelet[2504]: E1002 20:38:20.722871 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.723008 kubelet[2504]: W1002 20:38:20.722950 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.723095 kubelet[2504]: E1002 20:38:20.723085 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.723480 kubelet[2504]: E1002 20:38:20.723468 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.723556 kubelet[2504]: W1002 20:38:20.723544 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.723614 kubelet[2504]: E1002 20:38:20.723606 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.724121 kubelet[2504]: E1002 20:38:20.724107 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.724209 kubelet[2504]: W1002 20:38:20.724196 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.724291 kubelet[2504]: E1002 20:38:20.724281 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.724565 kubelet[2504]: E1002 20:38:20.724539 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.724565 kubelet[2504]: W1002 20:38:20.724561 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.724646 kubelet[2504]: E1002 20:38:20.724577 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.724927 kubelet[2504]: E1002 20:38:20.724908 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.724927 kubelet[2504]: W1002 20:38:20.724923 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.724996 kubelet[2504]: E1002 20:38:20.724935 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.690608 kubelet[2504]: E1002 20:38:21.690495 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.690608 kubelet[2504]: W1002 20:38:21.690516 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.690608 kubelet[2504]: E1002 20:38:21.690536 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.691203 kubelet[2504]: E1002 20:38:21.691030 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.691203 kubelet[2504]: W1002 20:38:21.691043 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.691203 kubelet[2504]: E1002 20:38:21.691057 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.691523 kubelet[2504]: E1002 20:38:21.691376 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.691523 kubelet[2504]: W1002 20:38:21.691387 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.691523 kubelet[2504]: E1002 20:38:21.691401 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.691859 kubelet[2504]: E1002 20:38:21.691686 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.691859 kubelet[2504]: W1002 20:38:21.691698 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.691859 kubelet[2504]: E1002 20:38:21.691710 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.692106 kubelet[2504]: E1002 20:38:21.692001 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.692106 kubelet[2504]: W1002 20:38:21.692014 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.692106 kubelet[2504]: E1002 20:38:21.692025 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.692453 kubelet[2504]: E1002 20:38:21.692257 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.692453 kubelet[2504]: W1002 20:38:21.692278 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.692453 kubelet[2504]: E1002 20:38:21.692290 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.692695 kubelet[2504]: E1002 20:38:21.692597 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.692695 kubelet[2504]: W1002 20:38:21.692608 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.692695 kubelet[2504]: E1002 20:38:21.692620 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.692939 kubelet[2504]: E1002 20:38:21.692851 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.692939 kubelet[2504]: W1002 20:38:21.692860 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.692939 kubelet[2504]: E1002 20:38:21.692871 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.693196 kubelet[2504]: E1002 20:38:21.693091 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.693196 kubelet[2504]: W1002 20:38:21.693102 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.693196 kubelet[2504]: E1002 20:38:21.693113 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.693505 kubelet[2504]: E1002 20:38:21.693361 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.693505 kubelet[2504]: W1002 20:38:21.693371 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.693505 kubelet[2504]: E1002 20:38:21.693382 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.693781 kubelet[2504]: E1002 20:38:21.693636 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.693781 kubelet[2504]: W1002 20:38:21.693647 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.693781 kubelet[2504]: E1002 20:38:21.693657 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.693967 kubelet[2504]: E1002 20:38:21.693904 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.693967 kubelet[2504]: W1002 20:38:21.693914 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.693967 kubelet[2504]: E1002 20:38:21.693924 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.702905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount160905799.mount: Deactivated successfully. Oct 2 20:38:21.723434 kubelet[2504]: E1002 20:38:21.723130 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.723434 kubelet[2504]: W1002 20:38:21.723167 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.723434 kubelet[2504]: E1002 20:38:21.723188 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.723807 kubelet[2504]: E1002 20:38:21.723648 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.723807 kubelet[2504]: W1002 20:38:21.723660 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.723807 kubelet[2504]: E1002 20:38:21.723687 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.724136 kubelet[2504]: E1002 20:38:21.723987 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.724136 kubelet[2504]: W1002 20:38:21.723997 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.724136 kubelet[2504]: E1002 20:38:21.724022 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.724434 kubelet[2504]: E1002 20:38:21.724317 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.724434 kubelet[2504]: W1002 20:38:21.724328 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.724434 kubelet[2504]: E1002 20:38:21.724353 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.724664 kubelet[2504]: E1002 20:38:21.724653 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.724743 kubelet[2504]: W1002 20:38:21.724732 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.724824 kubelet[2504]: E1002 20:38:21.724806 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.725054 kubelet[2504]: E1002 20:38:21.725037 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.725127 kubelet[2504]: W1002 20:38:21.725116 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.725224 kubelet[2504]: E1002 20:38:21.725207 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.725483 kubelet[2504]: E1002 20:38:21.725435 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.725559 kubelet[2504]: W1002 20:38:21.725547 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.725641 kubelet[2504]: E1002 20:38:21.725625 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.726035 kubelet[2504]: E1002 20:38:21.725802 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.726035 kubelet[2504]: W1002 20:38:21.725812 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.726035 kubelet[2504]: E1002 20:38:21.725838 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.726169 kubelet[2504]: E1002 20:38:21.726157 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.726242 kubelet[2504]: W1002 20:38:21.726231 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.726348 kubelet[2504]: E1002 20:38:21.726337 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.726551 kubelet[2504]: E1002 20:38:21.726529 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.726551 kubelet[2504]: W1002 20:38:21.726546 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.726627 kubelet[2504]: E1002 20:38:21.726561 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.726705 kubelet[2504]: E1002 20:38:21.726679 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.726705 kubelet[2504]: W1002 20:38:21.726693 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.726776 kubelet[2504]: E1002 20:38:21.726724 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.726889 kubelet[2504]: E1002 20:38:21.726862 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.726889 kubelet[2504]: W1002 20:38:21.726877 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.726889 kubelet[2504]: E1002 20:38:21.726888 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.727226 kubelet[2504]: E1002 20:38:21.727212 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.727340 kubelet[2504]: W1002 20:38:21.727327 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.727412 kubelet[2504]: E1002 20:38:21.727403 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.727664 kubelet[2504]: E1002 20:38:21.727651 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.727741 kubelet[2504]: W1002 20:38:21.727729 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.727823 kubelet[2504]: E1002 20:38:21.727803 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.728082 kubelet[2504]: E1002 20:38:21.728062 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.728082 kubelet[2504]: W1002 20:38:21.728081 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.728176 kubelet[2504]: E1002 20:38:21.728101 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.728289 kubelet[2504]: E1002 20:38:21.728255 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.728289 kubelet[2504]: W1002 20:38:21.728281 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.728351 kubelet[2504]: E1002 20:38:21.728293 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.728463 kubelet[2504]: E1002 20:38:21.728449 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.728463 kubelet[2504]: W1002 20:38:21.728460 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.728514 kubelet[2504]: E1002 20:38:21.728470 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.728873 kubelet[2504]: E1002 20:38:21.728852 2504 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:21.728873 kubelet[2504]: W1002 20:38:21.728870 2504 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:21.728956 kubelet[2504]: E1002 20:38:21.728887 2504 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.840379 env[1352]: time="2023-10-02T20:38:21.840338844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:21.847643 env[1352]: time="2023-10-02T20:38:21.847608083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:21.851942 env[1352]: time="2023-10-02T20:38:21.851913621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:21.853989 env[1352]: time="2023-10-02T20:38:21.853965081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:21.854398 env[1352]: time="2023-10-02T20:38:21.854371197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 20:38:21.858356 env[1352]: time="2023-10-02T20:38:21.858329904Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:38:21.879304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1626695915.mount: Deactivated successfully. Oct 2 20:38:21.890692 env[1352]: time="2023-10-02T20:38:21.890640503Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda\"" Oct 2 20:38:21.891256 env[1352]: time="2023-10-02T20:38:21.891231474Z" level=info msg="StartContainer for \"72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda\"" Oct 2 20:38:21.917865 systemd[1]: Started cri-containerd-72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda.scope. Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732616433613864386432376639393035396564656165666666666436 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit: BPF prog-id=140 op=LOAD Oct 2 20:38:21.938000 audit[3186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3007 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732616433613864386432376639393035396564656165666666666436 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.938000 audit: BPF prog-id=141 op=LOAD Oct 2 20:38:21.938000 audit[3186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3007 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732616433613864386432376639393035396564656165666666666436 Oct 2 20:38:21.939000 audit: BPF prog-id=141 op=UNLOAD Oct 2 20:38:21.939000 audit: BPF prog-id=140 op=UNLOAD Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.939000 audit: BPF prog-id=142 op=LOAD Oct 2 20:38:21.939000 audit[3186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3007 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732616433613864386432376639393035396564656165666666666436 Oct 2 20:38:21.962738 env[1352]: time="2023-10-02T20:38:21.962632426Z" level=info msg="StartContainer for \"72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda\" returns successfully" Oct 2 20:38:21.971771 systemd[1]: cri-containerd-72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda.scope: Deactivated successfully. Oct 2 20:38:21.975000 audit: BPF prog-id=142 op=UNLOAD Oct 2 20:38:22.660661 kubelet[2504]: E1002 20:38:22.660635 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:22.817542 env[1352]: time="2023-10-02T20:38:22.817495329Z" level=info msg="shim disconnected" id=72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda Oct 2 20:38:22.817819 env[1352]: time="2023-10-02T20:38:22.817785514Z" level=warning msg="cleaning up after shim disconnected" id=72ad3a8d8d27f99059edeaeffffd6b7ef3593da30654d61828a1e224acad3dda namespace=k8s.io Oct 2 20:38:22.817920 env[1352]: time="2023-10-02T20:38:22.817906044Z" level=info msg="cleaning up dead shim" Oct 2 20:38:22.830167 env[1352]: time="2023-10-02T20:38:22.830128738Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3230 runtime=io.containerd.runc.v2\n" Oct 2 20:38:23.634664 env[1352]: time="2023-10-02T20:38:23.634623938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:38:24.832668 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount909921918.mount: Deactivated successfully. Oct 2 20:38:27.661665 kubelet[2504]: E1002 20:38:27.661638 2504 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 20:38:27.945522 env[1352]: time="2023-10-02T20:38:27.945419394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:27.953628 env[1352]: time="2023-10-02T20:38:27.953596400Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:27.955890 env[1352]: time="2023-10-02T20:38:27.955865019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:27.958967 env[1352]: time="2023-10-02T20:38:27.958926861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:27.959223 env[1352]: time="2023-10-02T20:38:27.959191322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 20:38:27.961235 env[1352]: time="2023-10-02T20:38:27.961200280Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:38:27.981840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3452679875.mount: Deactivated successfully. Oct 2 20:38:27.986571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount415300059.mount: Deactivated successfully. Oct 2 20:38:27.999906 env[1352]: time="2023-10-02T20:38:27.999858773Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71\"" Oct 2 20:38:28.001375 env[1352]: time="2023-10-02T20:38:28.000513385Z" level=info msg="StartContainer for \"8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71\"" Oct 2 20:38:28.034233 systemd[1]: Started cri-containerd-8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71.scope. Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.061104 kernel: kauditd_printk_skb: 229 callbacks suppressed Oct 2 20:38:28.061193 kernel: audit: type=1400 audit(1696279108.053:1156): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.104448 kernel: audit: type=1300 audit(1696279108.053:1156): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366639323236366231393964656161613164343937623361343662 Oct 2 20:38:28.129209 kernel: audit: type=1327 audit(1696279108.053:1156): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366639323236366231393964656161613164343937623361343662 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.146762 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.146904 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.181780 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.181943 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.215738 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.233537 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.233641 kernel: audit: type=1400 audit(1696279108.053:1157): avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.233899 env[1352]: time="2023-10-02T20:38:28.233861223Z" level=info msg="StartContainer for \"8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71\" returns successfully" Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit: BPF prog-id=143 op=LOAD Oct 2 20:38:28.053000 audit[3250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3007 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366639323236366231393964656161613164343937623361343662 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit: BPF prog-id=144 op=LOAD Oct 2 20:38:28.053000 audit[3250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3007 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366639323236366231393964656161613164343937623361343662 Oct 2 20:38:28.053000 audit: BPF prog-id=144 op=UNLOAD Oct 2 20:38:28.053000 audit: BPF prog-id=143 op=UNLOAD Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { perfmon } for pid=3250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit[3250]: AVC avc: denied { bpf } for pid=3250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.053000 audit: BPF prog-id=145 op=LOAD Oct 2 20:38:28.053000 audit[3250]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3007 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366639323236366231393964656161613164343937623361343662 Oct 2 20:38:29.387052 env[1352]: time="2023-10-02T20:38:29.386994063Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:38:29.389731 systemd[1]: cri-containerd-8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71.scope: Deactivated successfully. Oct 2 20:38:29.394000 audit: BPF prog-id=145 op=UNLOAD Oct 2 20:38:29.415671 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71-rootfs.mount: Deactivated successfully. Oct 2 20:38:30.460821 env[1352]: time="2023-10-02T20:38:30.460775616Z" level=info msg="shim disconnected" id=8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71 Oct 2 20:38:30.461295 env[1352]: time="2023-10-02T20:38:30.461257732Z" level=warning msg="cleaning up after shim disconnected" id=8e6f92266b199deaaa1d497b3a46bc6d1dbd3313d75590a8ef865b68c1922e71 namespace=k8s.io Oct 2 20:38:30.461379 env[1352]: time="2023-10-02T20:38:30.461364420Z" level=info msg="cleaning up dead shim" Oct 2 20:38:30.474227 env[1352]: time="2023-10-02T20:38:30.474190384Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3297 runtime=io.containerd.runc.v2\n" Oct 2 20:38:30.643236 env[1352]: time="2023-10-02T20:38:30.641885821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:38:35.644437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2498839500.mount: Deactivated successfully. Oct 2 20:38:35.738951 env[1352]: time="2023-10-02T20:38:35.738900748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.746289 env[1352]: time="2023-10-02T20:38:35.746241858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.750424 env[1352]: time="2023-10-02T20:38:35.750399627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.754836 env[1352]: time="2023-10-02T20:38:35.754810413Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.755510 env[1352]: time="2023-10-02T20:38:35.755483860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 20:38:35.758544 env[1352]: time="2023-10-02T20:38:35.758474468Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:38:35.786493 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970092948.mount: Deactivated successfully. Oct 2 20:38:35.790460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4263503948.mount: Deactivated successfully. Oct 2 20:38:35.799008 env[1352]: time="2023-10-02T20:38:35.798967481Z" level=info msg="CreateContainer within sandbox \"57efda016f1daed60e34f0fa918bea71e0ee5e1a7e75f75ce72e22be652e0a72\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1\"" Oct 2 20:38:35.799663 env[1352]: time="2023-10-02T20:38:35.799638008Z" level=info msg="StartContainer for \"f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1\"" Oct 2 20:38:35.821638 systemd[1]: Started cri-containerd-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1.scope. Oct 2 20:38:35.844000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850122 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 20:38:35.850217 kernel: audit: type=1400 audit(1696279115.844:1163): avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.844000 audit[3317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.893556 kernel: audit: type=1300 audit(1696279115.844:1163): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636337626364383764303830336662353661323636336638646631 Oct 2 20:38:35.923148 kernel: audit: type=1327 audit(1696279115.844:1163): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636337626364383764303830336662353661323636336638646631 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.941630 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.959514 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.977528 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.995089 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.012999 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.030517 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.030930 env[1352]: time="2023-10-02T20:38:36.030870282Z" level=info msg="StartContainer for \"f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1\" returns successfully" Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.048022 kernel: audit: type=1400 audit(1696279115.845:1164): avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.845000 audit: BPF prog-id=146 op=LOAD Oct 2 20:38:35.845000 audit[3317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3007 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636337626364383764303830336662353661323636336638646631 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.850000 audit: BPF prog-id=147 op=LOAD Oct 2 20:38:35.850000 audit[3317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3007 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636337626364383764303830336662353661323636336638646631 Oct 2 20:38:35.866000 audit: BPF prog-id=147 op=UNLOAD Oct 2 20:38:35.866000 audit: BPF prog-id=146 op=UNLOAD Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.866000 audit: BPF prog-id=148 op=LOAD Oct 2 20:38:35.866000 audit[3317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3007 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630636337626364383764303830336662353661323636336638646631 Oct 2 20:38:36.256542 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:38:36.256666 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:38:36.673781 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.DD2adX.mount: Deactivated successfully. Oct 2 20:38:37.677155 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.cQY8lT.mount: Deactivated successfully. Oct 2 20:38:37.722000 audit[3453]: AVC avc: denied { write } for pid=3453 comm="tee" name="fd" dev="proc" ino=21986 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.722000 audit[3453]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0c59961 a2=241 a3=1b6 items=1 ppid=3404 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.722000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:38:37.722000 audit: PATH item=0 name="/dev/fd/63" inode=21960 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.758000 audit[3476]: AVC avc: denied { write } for pid=3476 comm="tee" name="fd" dev="proc" ino=22005 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.758000 audit[3476]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf6bf973 a2=241 a3=1b6 items=1 ppid=3411 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.758000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:38:37.758000 audit: PATH item=0 name="/dev/fd/63" inode=21983 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.765000 audit[3481]: AVC avc: denied { write } for pid=3481 comm="tee" name="fd" dev="proc" ino=22011 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.765000 audit[3481]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6c95971 a2=241 a3=1b6 items=1 ppid=3408 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.765000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:38:37.765000 audit: PATH item=0 name="/dev/fd/63" inode=21332 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.783000 audit[3483]: AVC avc: denied { write } for pid=3483 comm="tee" name="fd" dev="proc" ino=22019 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.783000 audit[3483]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd3bac972 a2=241 a3=1b6 items=1 ppid=3406 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.783000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:38:37.783000 audit: PATH item=0 name="/dev/fd/63" inode=21988 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.783000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.799000 audit[3490]: AVC avc: denied { write } for pid=3490 comm="tee" name="fd" dev="proc" ino=21363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.799000 audit[3490]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeebf3962 a2=241 a3=1b6 items=1 ppid=3416 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.799000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:38:37.799000 audit: PATH item=0 name="/dev/fd/63" inode=21335 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.799000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.810000 audit[3494]: AVC avc: denied { write } for pid=3494 comm="tee" name="fd" dev="proc" ino=21367 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.810000 audit[3494]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd66a0971 a2=241 a3=1b6 items=1 ppid=3409 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.810000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:38:37.810000 audit: PATH item=0 name="/dev/fd/63" inode=22015 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.810000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.845000 audit[3497]: AVC avc: denied { write } for pid=3497 comm="tee" name="fd" dev="proc" ino=21375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.845000 audit[3497]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6388971 a2=241 a3=1b6 items=1 ppid=3412 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.845000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:38:37.845000 audit: PATH item=0 name="/dev/fd/63" inode=22016 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.845000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit: BPF prog-id=149 op=LOAD Oct 2 20:38:38.211000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc62e1938 a2=70 a3=0 items=0 ppid=3410 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.211000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.211000 audit: BPF prog-id=149 op=UNLOAD Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit: BPF prog-id=150 op=LOAD Oct 2 20:38:38.211000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc62e1938 a2=70 a3=4a174c items=0 ppid=3410 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.211000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.211000 audit: BPF prog-id=150 op=UNLOAD Oct 2 20:38:38.211000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.211000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc62e1968 a2=70 a3=3f6cc79f items=0 ppid=3410 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.211000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.212000 audit: BPF prog-id=151 op=LOAD Oct 2 20:38:38.212000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc62e18b8 a2=70 a3=3f6cc7b9 items=0 ppid=3410 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.217000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.217000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc76c9d08 a2=70 a3=0 items=0 ppid=3410 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.217000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.217000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.217000 audit[3569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc76c9be8 a2=70 a3=2 items=0 ppid=3410 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.217000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.224000 audit: BPF prog-id=151 op=UNLOAD Oct 2 20:38:38.375000 audit[3594]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=3594 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.375000 audit[3594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe323f890 a2=0 a3=ffffbcc58fa0 items=0 ppid=3410 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.375000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.411086 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.tsYGoH.mount: Deactivated successfully. Oct 2 20:38:38.412000 audit[3593]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_chain pid=3593 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.412000 audit[3593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffab6b3d0 a2=0 a3=ffffb00f4fa0 items=0 ppid=3410 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.414000 audit[3599]: NETFILTER_CFG table=filter:116 family=2 entries=39 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.414000 audit[3599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc86d24c0 a2=0 a3=ffffa4af1fa0 items=0 ppid=3410 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.416000 audit[3592]: NETFILTER_CFG table=raw:117 family=2 entries=19 op=nft_register_chain pid=3592 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.416000 audit[3592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc451a150 a2=0 a3=ffffbd261fa0 items=0 ppid=3410 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.537629 kubelet[2504]: I1002 20:38:38.537531 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:38.540467 kubelet[2504]: I1002 20:38:38.540388 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:38.541662 kubelet[2504]: I1002 20:38:38.541617 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:38.542966 kubelet[2504]: I1002 20:38:38.542713 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:38.544148 systemd[1]: Created slice kubepods-burstable-pod80eb30c4_344a_4688_991e_df3e351b93b5.slice. Oct 2 20:38:38.550149 systemd[1]: Created slice kubepods-besteffort-pod7209cb39_74f5_4479_a4f0_bdbd9ab32d43.slice. Oct 2 20:38:38.556717 systemd[1]: Created slice kubepods-burstable-pod024f4ec8_cffe_48aa_b6a6_a21dd15ff8cf.slice. Oct 2 20:38:38.562539 systemd[1]: Created slice kubepods-besteffort-podb713aed7_6c79_45d2_97b6_d00ab0da3f32.slice. Oct 2 20:38:38.629113 kubelet[2504]: I1002 20:38:38.629073 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/b713aed7-6c79-45d2-97b6-d00ab0da3f32-etccalico\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.629238 kubelet[2504]: I1002 20:38:38.629129 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cn6ts\" (UniqueName: \"kubernetes.io/projected/7209cb39-74f5-4479-a4f0-bdbd9ab32d43-kube-api-access-cn6ts\") pod \"calico-kube-controllers-69d9c784fb-bckkj\" (UID: \"7209cb39-74f5-4479-a4f0-bdbd9ab32d43\") " pod="calico-system/calico-kube-controllers-69d9c784fb-bckkj" Oct 2 20:38:38.629238 kubelet[2504]: I1002 20:38:38.629154 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf-config-volume\") pod \"coredns-565d847f94-dc474\" (UID: \"024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf\") " pod="kube-system/coredns-565d847f94-dc474" Oct 2 20:38:38.629238 kubelet[2504]: I1002 20:38:38.629175 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b713aed7-6c79-45d2-97b6-d00ab0da3f32-socket-dir\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.629238 kubelet[2504]: I1002 20:38:38.629196 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b713aed7-6c79-45d2-97b6-d00ab0da3f32-registration-dir\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.629238 kubelet[2504]: I1002 20:38:38.629216 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b713aed7-6c79-45d2-97b6-d00ab0da3f32-kubelet-dir\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.629405 kubelet[2504]: I1002 20:38:38.629235 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmlnc\" (UniqueName: \"kubernetes.io/projected/b713aed7-6c79-45d2-97b6-d00ab0da3f32-kube-api-access-xmlnc\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.629405 kubelet[2504]: I1002 20:38:38.629256 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/80eb30c4-344a-4688-991e-df3e351b93b5-config-volume\") pod \"coredns-565d847f94-hhvrv\" (UID: \"80eb30c4-344a-4688-991e-df3e351b93b5\") " pod="kube-system/coredns-565d847f94-hhvrv" Oct 2 20:38:38.629405 kubelet[2504]: I1002 20:38:38.629309 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9wgh\" (UniqueName: \"kubernetes.io/projected/80eb30c4-344a-4688-991e-df3e351b93b5-kube-api-access-p9wgh\") pod \"coredns-565d847f94-hhvrv\" (UID: \"80eb30c4-344a-4688-991e-df3e351b93b5\") " pod="kube-system/coredns-565d847f94-hhvrv" Oct 2 20:38:38.629405 kubelet[2504]: I1002 20:38:38.629333 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7t6dw\" (UniqueName: \"kubernetes.io/projected/024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf-kube-api-access-7t6dw\") pod \"coredns-565d847f94-dc474\" (UID: \"024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf\") " pod="kube-system/coredns-565d847f94-dc474" Oct 2 20:38:38.629405 kubelet[2504]: I1002 20:38:38.629354 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b713aed7-6c79-45d2-97b6-d00ab0da3f32-varrun\") pod \"csi-node-driver-w2gvb\" (UID: \"b713aed7-6c79-45d2-97b6-d00ab0da3f32\") " pod="calico-system/csi-node-driver-w2gvb" Oct 2 20:38:38.853901 env[1352]: time="2023-10-02T20:38:38.853846537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bckkj,Uid:7209cb39-74f5-4479-a4f0-bdbd9ab32d43,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:38.863788 env[1352]: time="2023-10-02T20:38:38.863485018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dc474,Uid:024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:39.039448 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab1a647434f: link becomes ready Oct 2 20:38:39.044533 systemd-networkd[1494]: caliab1a647434f: Link UP Oct 2 20:38:39.044539 systemd-networkd[1494]: caliab1a647434f: Gained carrier Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:38.965 [INFO][3630] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0 calico-kube-controllers-69d9c784fb- calico-system 7209cb39-74f5-4479-a4f0-bdbd9ab32d43 642 0 2023-10-02 20:38:17 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69d9c784fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 calico-kube-controllers-69d9c784fb-bckkj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliab1a647434f [] []}} ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:38.965 [INFO][3630] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:38.996 [INFO][3642] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" HandleID="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.008 [INFO][3642] ipam_plugin.go 269: Auto assigning IP ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" HandleID="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d5c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-f31f601c03", "pod":"calico-kube-controllers-69d9c784fb-bckkj", "timestamp":"2023-10-02 20:38:38.996028672 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:39.064287 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:39.064287 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.009 [INFO][3642] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.010 [INFO][3642] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.014 [INFO][3642] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.017 [INFO][3642] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.018 [INFO][3642] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.020 [INFO][3642] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.020 [INFO][3642] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.021 [INFO][3642] ipam.go 1682: Creating new handle: k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4 Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.024 [INFO][3642] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.029 [INFO][3642] ipam.go 1216: Successfully claimed IPs: [192.168.60.129/26] block=192.168.60.128/26 handle="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.029 [INFO][3642] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.129/26] handle="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.064287 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:39.064287 env[1352]: 2023-10-02 20:38:39.029 [INFO][3642] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.129/26] IPv6=[] ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" HandleID="k8s-pod-network.71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.031 [INFO][3630] k8s.go 383: Populated endpoint ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"7209cb39-74f5-4479-a4f0-bdbd9ab32d43", ResourceVersion:"642", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"calico-kube-controllers-69d9c784fb-bckkj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.60.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliab1a647434f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.031 [INFO][3630] k8s.go 384: Calico CNI using IPs: [192.168.60.129/32] ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.031 [INFO][3630] dataplane_linux.go 68: Setting the host side veth name to caliab1a647434f ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.038 [INFO][3630] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.045 [INFO][3630] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"7209cb39-74f5-4479-a4f0-bdbd9ab32d43", ResourceVersion:"642", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4", Pod:"calico-kube-controllers-69d9c784fb-bckkj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.60.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliab1a647434f", MAC:"5e:91:5a:4a:58:e6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.064875 env[1352]: 2023-10-02 20:38:39.056 [INFO][3630] k8s.go 489: Wrote updated endpoint to datastore ContainerID="71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bckkj" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--kube--controllers--69d9c784fb--bckkj-eth0" Oct 2 20:38:39.171185 env[1352]: time="2023-10-02T20:38:39.169742026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w2gvb,Uid:b713aed7-6c79-45d2-97b6-d00ab0da3f32,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:39.286028 env[1352]: time="2023-10-02T20:38:39.285935204Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:39.286028 env[1352]: time="2023-10-02T20:38:39.285977087Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:39.286028 env[1352]: time="2023-10-02T20:38:39.285986967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:39.286459 env[1352]: time="2023-10-02T20:38:39.286407395Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4 pid=3670 runtime=io.containerd.runc.v2 Oct 2 20:38:39.307518 systemd-networkd[1494]: vxlan.calico: Link UP Oct 2 20:38:39.307526 systemd-networkd[1494]: vxlan.calico: Gained carrier Oct 2 20:38:39.333480 systemd[1]: Started cri-containerd-71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4.scope. Oct 2 20:38:39.347000 audit[3708]: NETFILTER_CFG table=filter:118 family=2 entries=36 op=nft_register_chain pid=3708 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:39.347000 audit[3708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffeb8492e0 a2=0 a3=ffff9eaeafa0 items=0 ppid=3410 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.347000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.362000 audit: BPF prog-id=152 op=LOAD Oct 2 20:38:39.362000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.362000 audit[3680]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=3670 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613061626432393666396538666336373962323862323166626463 Oct 2 20:38:39.362000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.362000 audit[3680]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=3670 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613061626432393666396538666336373962323862323166626463 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit: BPF prog-id=153 op=LOAD Oct 2 20:38:39.363000 audit[3680]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=3670 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613061626432393666396538666336373962323862323166626463 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.363000 audit: BPF prog-id=154 op=LOAD Oct 2 20:38:39.363000 audit[3680]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=3670 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613061626432393666396538666336373962323862323166626463 Oct 2 20:38:39.364000 audit: BPF prog-id=154 op=UNLOAD Oct 2 20:38:39.364000 audit: BPF prog-id=153 op=UNLOAD Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.364000 audit: BPF prog-id=155 op=LOAD Oct 2 20:38:39.364000 audit[3680]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=3670 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613061626432393666396538666336373962323862323166626463 Oct 2 20:38:39.421492 env[1352]: time="2023-10-02T20:38:39.421357123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bckkj,Uid:7209cb39-74f5-4479-a4f0-bdbd9ab32d43,Namespace:calico-system,Attempt:0,} returns sandbox id \"71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4\"" Oct 2 20:38:39.433026 env[1352]: time="2023-10-02T20:38:39.432979565Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 20:38:39.449439 env[1352]: time="2023-10-02T20:38:39.449396561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-hhvrv,Uid:80eb30c4-344a-4688-991e-df3e351b93b5,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:39.553675 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:39.553800 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali96e26925611: link becomes ready Oct 2 20:38:39.565990 systemd-networkd[1494]: cali96e26925611: Link UP Oct 2 20:38:39.565996 systemd-networkd[1494]: cali96e26925611: Gained carrier Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.408 [INFO][3686] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0 coredns-565d847f94- kube-system 024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf 643 0 2023-10-02 20:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 coredns-565d847f94-dc474 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali96e26925611 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.408 [INFO][3686] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.480 [INFO][3733] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" HandleID="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.498 [INFO][3733] ipam_plugin.go 269: Auto assigning IP ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" HandleID="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d6a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-f31f601c03", "pod":"coredns-565d847f94-dc474", "timestamp":"2023-10-02 20:38:39.480592847 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:39.585416 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:39.585416 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.498 [INFO][3733] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.502 [INFO][3733] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.506 [INFO][3733] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.511 [INFO][3733] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.512 [INFO][3733] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.521 [INFO][3733] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.521 [INFO][3733] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.522 [INFO][3733] ipam.go 1682: Creating new handle: k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370 Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.526 [INFO][3733] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.532 [INFO][3733] ipam.go 1216: Successfully claimed IPs: [192.168.60.130/26] block=192.168.60.128/26 handle="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.532 [INFO][3733] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.130/26] handle="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.585416 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:39.585416 env[1352]: 2023-10-02 20:38:39.533 [INFO][3733] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.130/26] IPv6=[] ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" HandleID="k8s-pod-network.50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.538 [INFO][3686] k8s.go 383: Populated endpoint ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf", ResourceVersion:"643", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"coredns-565d847f94-dc474", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.60.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96e26925611", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.539 [INFO][3686] k8s.go 384: Calico CNI using IPs: [192.168.60.130/32] ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.539 [INFO][3686] dataplane_linux.go 68: Setting the host side veth name to cali96e26925611 ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.560 [INFO][3686] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.570 [INFO][3686] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf", ResourceVersion:"643", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370", Pod:"coredns-565d847f94-dc474", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.60.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96e26925611", MAC:"ca:06:29:9c:ab:25", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.585969 env[1352]: 2023-10-02 20:38:39.581 [INFO][3686] k8s.go 489: Wrote updated endpoint to datastore ContainerID="50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370" Namespace="kube-system" Pod="coredns-565d847f94-dc474" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--dc474-eth0" Oct 2 20:38:39.626365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali46211a83658: link becomes ready Oct 2 20:38:39.635983 systemd-networkd[1494]: cali46211a83658: Link UP Oct 2 20:38:39.635989 systemd-networkd[1494]: cali46211a83658: Gained carrier Oct 2 20:38:39.653136 env[1352]: time="2023-10-02T20:38:39.645878084Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:39.653136 env[1352]: time="2023-10-02T20:38:39.645918406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:39.653136 env[1352]: time="2023-10-02T20:38:39.645928927Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:39.653136 env[1352]: time="2023-10-02T20:38:39.646091058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370 pid=3783 runtime=io.containerd.runc.v2 Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.447 [INFO][3699] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0 csi-node-driver- calico-system b713aed7-6c79-45d2-97b6-d00ab0da3f32 644 0 2023-10-02 20:38:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 csi-node-driver-w2gvb eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali46211a83658 [] []}} ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.447 [INFO][3699] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.510 [INFO][3743] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" HandleID="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Workload="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.533 [INFO][3743] ipam_plugin.go 269: Auto assigning IP ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" HandleID="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Workload="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004df50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-f31f601c03", "pod":"csi-node-driver-w2gvb", "timestamp":"2023-10-02 20:38:39.510448644 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:39.665751 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:39.665751 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.533 [INFO][3743] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.536 [INFO][3743] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.551 [INFO][3743] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.560 [INFO][3743] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.562 [INFO][3743] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.564 [INFO][3743] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.582 [INFO][3743] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.587 [INFO][3743] ipam.go 1682: Creating new handle: k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2 Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.591 [INFO][3743] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.599 [INFO][3743] ipam.go 1216: Successfully claimed IPs: [192.168.60.131/26] block=192.168.60.128/26 handle="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.600 [INFO][3743] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.131/26] handle="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.665751 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:39.665751 env[1352]: 2023-10-02 20:38:39.600 [INFO][3743] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.131/26] IPv6=[] ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" HandleID="k8s-pod-network.69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Workload="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.611 [INFO][3699] k8s.go 383: Populated endpoint ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b713aed7-6c79-45d2-97b6-d00ab0da3f32", ResourceVersion:"644", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"csi-node-driver-w2gvb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.60.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali46211a83658", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.612 [INFO][3699] k8s.go 384: Calico CNI using IPs: [192.168.60.131/32] ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.612 [INFO][3699] dataplane_linux.go 68: Setting the host side veth name to cali46211a83658 ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.614 [INFO][3699] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.635 [INFO][3699] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b713aed7-6c79-45d2-97b6-d00ab0da3f32", ResourceVersion:"644", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2", Pod:"csi-node-driver-w2gvb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.60.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali46211a83658", MAC:"c2:08:0a:64:c4:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.666355 env[1352]: 2023-10-02 20:38:39.656 [INFO][3699] k8s.go 489: Wrote updated endpoint to datastore ContainerID="69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2" Namespace="calico-system" Pod="csi-node-driver-w2gvb" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-csi--node--driver--w2gvb-eth0" Oct 2 20:38:39.681796 systemd[1]: Started cri-containerd-50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370.scope. Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.710000 audit: BPF prog-id=156 op=LOAD Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3783 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623364376236393061643166343832313561333232313038333231 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3783 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623364376236393061643166343832313561333232313038333231 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit: BPF prog-id=157 op=LOAD Oct 2 20:38:39.711000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3783 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623364376236393061643166343832313561333232313038333231 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit: BPF prog-id=158 op=LOAD Oct 2 20:38:39.711000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3783 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623364376236393061643166343832313561333232313038333231 Oct 2 20:38:39.711000 audit: BPF prog-id=158 op=UNLOAD Oct 2 20:38:39.711000 audit: BPF prog-id=157 op=UNLOAD Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.711000 audit: BPF prog-id=159 op=LOAD Oct 2 20:38:39.711000 audit[3802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3783 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623364376236393061643166343832313561333232313038333231 Oct 2 20:38:39.715000 audit[3801]: NETFILTER_CFG table=filter:119 family=2 entries=40 op=nft_register_chain pid=3801 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:39.715000 audit[3801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffebfbc7c0 a2=0 a3=ffff9e8b9fa0 items=0 ppid=3410 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:39.756187 env[1352]: time="2023-10-02T20:38:39.756138353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dc474,Uid:024f4ec8-cffe-48aa-b6a6-a21dd15ff8cf,Namespace:kube-system,Attempt:0,} returns sandbox id \"50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370\"" Oct 2 20:38:39.763489 env[1352]: time="2023-10-02T20:38:39.763443072Z" level=info msg="CreateContainer within sandbox \"50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:39.770160 env[1352]: time="2023-10-02T20:38:39.770095028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:39.770351 env[1352]: time="2023-10-02T20:38:39.770297761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:39.770447 env[1352]: time="2023-10-02T20:38:39.770425889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:39.770699 env[1352]: time="2023-10-02T20:38:39.770671546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2 pid=3846 runtime=io.containerd.runc.v2 Oct 2 20:38:39.790144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2291664338.mount: Deactivated successfully. Oct 2 20:38:39.806951 env[1352]: time="2023-10-02T20:38:39.806419089Z" level=info msg="CreateContainer within sandbox \"50b3d7b690ad1f48215a322108321274b55fec01d6adef2e41bc33d430960370\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ad858062fa3891979d7d131e97037406f534ddcc56197aac5df93e98cfbc20ad\"" Oct 2 20:38:39.807707 env[1352]: time="2023-10-02T20:38:39.807680372Z" level=info msg="StartContainer for \"ad858062fa3891979d7d131e97037406f534ddcc56197aac5df93e98cfbc20ad\"" Oct 2 20:38:39.809216 systemd[1]: Started cri-containerd-69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2.scope. Oct 2 20:38:39.821390 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0dab3cfa57: link becomes ready Oct 2 20:38:39.838851 systemd[1]: Started cri-containerd-ad858062fa3891979d7d131e97037406f534ddcc56197aac5df93e98cfbc20ad.scope. Oct 2 20:38:39.843927 systemd-networkd[1494]: calif0dab3cfa57: Link UP Oct 2 20:38:39.843933 systemd-networkd[1494]: calif0dab3cfa57: Gained carrier Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.629 [INFO][3749] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0 coredns-565d847f94- kube-system 80eb30c4-344a-4688-991e-df3e351b93b5 640 0 2023-10-02 20:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 coredns-565d847f94-hhvrv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif0dab3cfa57 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.629 [INFO][3749] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.744 [INFO][3796] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" HandleID="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.767 [INFO][3796] ipam_plugin.go 269: Auto assigning IP ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" HandleID="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400012d060), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-f31f601c03", "pod":"coredns-565d847f94-hhvrv", "timestamp":"2023-10-02 20:38:39.744941619 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:39.860717 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:39.860717 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.767 [INFO][3796] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.769 [INFO][3796] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.773 [INFO][3796] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.782 [INFO][3796] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.784 [INFO][3796] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.786 [INFO][3796] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.786 [INFO][3796] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.794 [INFO][3796] ipam.go 1682: Creating new handle: k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444 Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.797 [INFO][3796] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.803 [INFO][3796] ipam.go 1216: Successfully claimed IPs: [192.168.60.132/26] block=192.168.60.128/26 handle="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.804 [INFO][3796] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.132/26] handle="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:39.860717 env[1352]: time="2023-10-02T20:38:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:39.860717 env[1352]: 2023-10-02 20:38:39.804 [INFO][3796] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.132/26] IPv6=[] ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" HandleID="k8s-pod-network.5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Workload="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.812 [INFO][3749] k8s.go 383: Populated endpoint ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"80eb30c4-344a-4688-991e-df3e351b93b5", ResourceVersion:"640", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"coredns-565d847f94-hhvrv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.60.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0dab3cfa57", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.812 [INFO][3749] k8s.go 384: Calico CNI using IPs: [192.168.60.132/32] ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.812 [INFO][3749] dataplane_linux.go 68: Setting the host side veth name to calif0dab3cfa57 ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.821 [INFO][3749] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.844 [INFO][3749] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"80eb30c4-344a-4688-991e-df3e351b93b5", ResourceVersion:"640", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444", Pod:"coredns-565d847f94-hhvrv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.60.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif0dab3cfa57", MAC:"da:37:1c:d7:5d:bb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:39.861520 env[1352]: 2023-10-02 20:38:39.858 [INFO][3749] k8s.go 489: Wrote updated endpoint to datastore ContainerID="5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444" Namespace="kube-system" Pod="coredns-565d847f94-hhvrv" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-coredns--565d847f94--hhvrv-eth0" Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.877000 audit: BPF prog-id=160 op=LOAD Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3783 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383538303632666133383931393739643764313331653937303337 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3783 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383538303632666133383931393739643764313331653937303337 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit: BPF prog-id=161 op=LOAD Oct 2 20:38:39.878000 audit[3874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3783 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383538303632666133383931393739643764313331653937303337 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit: BPF prog-id=162 op=LOAD Oct 2 20:38:39.878000 audit[3874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3783 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383538303632666133383931393739643764313331653937303337 Oct 2 20:38:39.878000 audit: BPF prog-id=162 op=UNLOAD Oct 2 20:38:39.878000 audit: BPF prog-id=161 op=UNLOAD Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.878000 audit: BPF prog-id=163 op=LOAD Oct 2 20:38:39.878000 audit[3874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3783 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383538303632666133383931393739643764313331653937303337 Oct 2 20:38:39.898000 audit[3915]: NETFILTER_CFG table=filter:120 family=2 entries=38 op=nft_register_chain pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:39.898000 audit[3915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19508 a0=3 a1=ffffe084dab0 a2=0 a3=ffffa2b9dfa0 items=0 ppid=3410 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:39.901936 env[1352]: time="2023-10-02T20:38:39.900463375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:39.901936 env[1352]: time="2023-10-02T20:38:39.900508018Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:39.901936 env[1352]: time="2023-10-02T20:38:39.900519099Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:39.904915 env[1352]: time="2023-10-02T20:38:39.903158512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444 pid=3914 runtime=io.containerd.runc.v2 Oct 2 20:38:39.917952 env[1352]: time="2023-10-02T20:38:39.917898158Z" level=info msg="StartContainer for \"ad858062fa3891979d7d131e97037406f534ddcc56197aac5df93e98cfbc20ad\" returns successfully" Oct 2 20:38:39.926946 systemd[1]: Started cri-containerd-5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444.scope. Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit: BPF prog-id=164 op=LOAD Oct 2 20:38:39.966000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.966000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3914 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565336361393331353138323630323439343832396165393164353333 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3914 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565336361393331353138323630323439343832396165393164353333 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit: BPF prog-id=165 op=LOAD Oct 2 20:38:39.967000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3914 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565336361393331353138323630323439343832396165393164353333 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit: BPF prog-id=166 op=LOAD Oct 2 20:38:39.967000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3914 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565336361393331353138323630323439343832396165393164353333 Oct 2 20:38:39.967000 audit: BPF prog-id=166 op=UNLOAD Oct 2 20:38:39.967000 audit: BPF prog-id=165 op=UNLOAD Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { perfmon } for pid=3931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.967000 audit: BPF prog-id=167 op=LOAD Oct 2 20:38:39.967000 audit[3931]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3914 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565336361393331353138323630323439343832396165393164353333 Oct 2 20:38:39.973000 audit[3957]: NETFILTER_CFG table=filter:121 family=2 entries=38 op=nft_register_chain pid=3957 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:39.973000 audit[3957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=ffffdbe025b0 a2=0 a3=ffff9bef2fa0 items=0 ppid=3410 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit: BPF prog-id=168 op=LOAD Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3846 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639646635323965356439323034633633616138386430376338656230 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3846 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639646635323965356439323034633633616138386430376338656230 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit: BPF prog-id=169 op=LOAD Oct 2 20:38:39.984000 audit[3857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3846 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639646635323965356439323034633633616138386430376338656230 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.984000 audit: BPF prog-id=170 op=LOAD Oct 2 20:38:39.984000 audit[3857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3846 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639646635323965356439323034633633616138386430376338656230 Oct 2 20:38:39.984000 audit: BPF prog-id=170 op=UNLOAD Oct 2 20:38:39.985000 audit: BPF prog-id=169 op=UNLOAD Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:39.985000 audit: BPF prog-id=171 op=LOAD Oct 2 20:38:39.985000 audit[3857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3846 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:39.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639646635323965356439323034633633616138386430376338656230 Oct 2 20:38:40.010478 env[1352]: time="2023-10-02T20:38:40.009466315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w2gvb,Uid:b713aed7-6c79-45d2-97b6-d00ab0da3f32,Namespace:calico-system,Attempt:0,} returns sandbox id \"69df529e5d9204c63aa88d07c8eb018b2fca4f332a28528e39c3c4bc2db872a2\"" Oct 2 20:38:40.018329 env[1352]: time="2023-10-02T20:38:40.017913661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-hhvrv,Uid:80eb30c4-344a-4688-991e-df3e351b93b5,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444\"" Oct 2 20:38:40.021180 env[1352]: time="2023-10-02T20:38:40.021145550Z" level=info msg="CreateContainer within sandbox \"5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:40.047827 env[1352]: time="2023-10-02T20:38:40.047780832Z" level=info msg="CreateContainer within sandbox \"5e3ca9315182602494829ae91d5330cc0e2960fb70211b1474308123a6f24444\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"211cf2198901267f393a99ba0669983053fa71eede2e498c463d79e1e9adcc1c\"" Oct 2 20:38:40.048627 env[1352]: time="2023-10-02T20:38:40.048599685Z" level=info msg="StartContainer for \"211cf2198901267f393a99ba0669983053fa71eede2e498c463d79e1e9adcc1c\"" Oct 2 20:38:40.083528 systemd[1]: Started cri-containerd-211cf2198901267f393a99ba0669983053fa71eede2e498c463d79e1e9adcc1c.scope. Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.097000 audit: BPF prog-id=172 op=LOAD Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3914 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231316366323139383930313236376633393361393962613036363939 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3914 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231316366323139383930313236376633393361393962613036363939 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit: BPF prog-id=173 op=LOAD Oct 2 20:38:40.098000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3914 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231316366323139383930313236376633393361393962613036363939 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit: BPF prog-id=174 op=LOAD Oct 2 20:38:40.098000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3914 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231316366323139383930313236376633393361393962613036363939 Oct 2 20:38:40.098000 audit: BPF prog-id=174 op=UNLOAD Oct 2 20:38:40.098000 audit: BPF prog-id=173 op=UNLOAD Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:40.098000 audit: BPF prog-id=175 op=LOAD Oct 2 20:38:40.098000 audit[3985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3914 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231316366323139383930313236376633393361393962613036363939 Oct 2 20:38:40.118643 env[1352]: time="2023-10-02T20:38:40.118595971Z" level=info msg="StartContainer for \"211cf2198901267f393a99ba0669983053fa71eede2e498c463d79e1e9adcc1c\" returns successfully" Oct 2 20:38:40.136471 systemd-networkd[1494]: caliab1a647434f: Gained IPv6LL Oct 2 20:38:40.713494 systemd-networkd[1494]: cali46211a83658: Gained IPv6LL Oct 2 20:38:40.776510 systemd-networkd[1494]: cali96e26925611: Gained IPv6LL Oct 2 20:38:40.875311 kernel: kauditd_printk_skb: 483 callbacks suppressed Oct 2 20:38:40.875446 kernel: audit: type=1325 audit(1696279120.868:1301): table=filter:122 family=2 entries=12 op=nft_register_rule pid=4046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:40.868000 audit[4046]: NETFILTER_CFG table=filter:122 family=2 entries=12 op=nft_register_rule pid=4046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:40.868000 audit[4046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffce11ef90 a2=0 a3=ffff98b386c0 items=0 ppid=2702 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.919731 kernel: audit: type=1300 audit(1696279120.868:1301): arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffce11ef90 a2=0 a3=ffff98b386c0 items=0 ppid=2702 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:40.933970 kernel: audit: type=1327 audit(1696279120.868:1301): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:40.874000 audit[4046]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=4046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:40.950811 kernel: audit: type=1325 audit(1696279120.874:1302): table=nat:123 family=2 entries=30 op=nft_register_rule pid=4046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:40.874000 audit[4046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffce11ef90 a2=0 a3=ffff98b386c0 items=0 ppid=2702 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.978181 kernel: audit: type=1300 audit(1696279120.874:1302): arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffce11ef90 a2=0 a3=ffff98b386c0 items=0 ppid=2702 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:40.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:40.993426 kernel: audit: type=1327 audit(1696279120.874:1302): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:41.044000 audit[4074]: NETFILTER_CFG table=filter:124 family=2 entries=9 op=nft_register_rule pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:41.044000 audit[4074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffec5388c0 a2=0 a3=ffffa0baa6c0 items=0 ppid=2702 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.090455 kernel: audit: type=1325 audit(1696279121.044:1303): table=filter:124 family=2 entries=9 op=nft_register_rule pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:41.090580 kernel: audit: type=1300 audit(1696279121.044:1303): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffec5388c0 a2=0 a3=ffffa0baa6c0 items=0 ppid=2702 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:41.104382 kernel: audit: type=1327 audit(1696279121.044:1303): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:41.106593 kernel: audit: type=1325 audit(1696279121.104:1304): table=nat:125 family=2 entries=63 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:41.104000 audit[4074]: NETFILTER_CFG table=nat:125 family=2 entries=63 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:41.104000 audit[4074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffec5388c0 a2=0 a3=ffffa0baa6c0 items=0 ppid=2702 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:41.161486 systemd-networkd[1494]: vxlan.calico: Gained IPv6LL Oct 2 20:38:41.161724 systemd-networkd[1494]: calif0dab3cfa57: Gained IPv6LL Oct 2 20:38:41.665418 env[1352]: time="2023-10-02T20:38:41.665370167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:41.671647 env[1352]: time="2023-10-02T20:38:41.671609205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:41.678141 env[1352]: time="2023-10-02T20:38:41.678093778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:41.682990 env[1352]: time="2023-10-02T20:38:41.682955809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:41.683617 env[1352]: time="2023-10-02T20:38:41.683584729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 20:38:41.684901 env[1352]: time="2023-10-02T20:38:41.684868251Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:38:41.687921 env[1352]: time="2023-10-02T20:38:41.687893244Z" level=info msg="CreateContainer within sandbox \"71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 20:38:41.713165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2111736971.mount: Deactivated successfully. Oct 2 20:38:41.718772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3491160294.mount: Deactivated successfully. Oct 2 20:38:41.728186 env[1352]: time="2023-10-02T20:38:41.728133450Z" level=info msg="CreateContainer within sandbox \"71a0abd296f9e8fc679b28b21fbdcb513b8436c335c16158f362039ee69f13b4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b\"" Oct 2 20:38:41.730732 env[1352]: time="2023-10-02T20:38:41.730688173Z" level=info msg="StartContainer for \"7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b\"" Oct 2 20:38:41.753781 systemd[1]: Started cri-containerd-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b.scope. Oct 2 20:38:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit: BPF prog-id=176 op=LOAD Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3670 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303631633661313033346465393765353266356164373430323433 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3670 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303631633661313033346465393765353266356164373430323433 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit: BPF prog-id=177 op=LOAD Oct 2 20:38:41.770000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3670 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303631633661313033346465393765353266356164373430323433 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit: BPF prog-id=178 op=LOAD Oct 2 20:38:41.770000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3670 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303631633661313033346465393765353266356164373430323433 Oct 2 20:38:41.770000 audit: BPF prog-id=178 op=UNLOAD Oct 2 20:38:41.770000 audit: BPF prog-id=177 op=UNLOAD Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:41.770000 audit: BPF prog-id=179 op=LOAD Oct 2 20:38:41.770000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3670 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:41.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303631633661313033346465393765353266356164373430323433 Oct 2 20:38:41.792049 env[1352]: time="2023-10-02T20:38:41.791992884Z" level=info msg="StartContainer for \"7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b\" returns successfully" Oct 2 20:38:41.844951 env[1352]: time="2023-10-02T20:38:41.844816653Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:41.847630 env[1352]: time="2023-10-02T20:38:41.847579429Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:41.848500 kubelet[2504]: E1002 20:38:41.847959 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:41.848500 kubelet[2504]: E1002 20:38:41.848011 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:41.848915 kubelet[2504]: E1002 20:38:41.848121 2504 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:41.849769 env[1352]: time="2023-10-02T20:38:41.849715406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:38:42.009690 env[1352]: time="2023-10-02T20:38:42.009545394Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:42.012549 env[1352]: time="2023-10-02T20:38:42.012490699Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:42.013407 kubelet[2504]: E1002 20:38:42.012842 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:42.013407 kubelet[2504]: E1002 20:38:42.012878 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:42.013407 kubelet[2504]: E1002 20:38:42.013000 2504 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:42.013407 kubelet[2504]: E1002 20:38:42.013366 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:38:42.711741 kubelet[2504]: E1002 20:38:42.711704 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:38:42.741959 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.WPBndY.mount: Deactivated successfully. Oct 2 20:38:48.410788 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.xnBDgf.mount: Deactivated successfully. Oct 2 20:38:49.406615 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.MzwFSx.mount: Deactivated successfully. Oct 2 20:38:51.557824 kubelet[2504]: I1002 20:38:51.557792 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:51.563228 systemd[1]: Created slice kubepods-besteffort-pod0625c3f2_65a8_4439_990d_21c3f2195b00.slice. Oct 2 20:38:51.570577 kubelet[2504]: I1002 20:38:51.570551 2504 topology_manager.go:205] "Topology Admit Handler" Oct 2 20:38:51.575056 systemd[1]: Created slice kubepods-besteffort-pod2da1699c_7287_4f5f_b5d9_8b55e35a4041.slice. Oct 2 20:38:51.613052 kubelet[2504]: I1002 20:38:51.613022 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0625c3f2-65a8-4439-990d-21c3f2195b00-calico-apiserver-certs\") pod \"calico-apiserver-67dfcc97d4-xs5fw\" (UID: \"0625c3f2-65a8-4439-990d-21c3f2195b00\") " pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" Oct 2 20:38:51.613260 kubelet[2504]: I1002 20:38:51.613248 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8q5h2\" (UniqueName: \"kubernetes.io/projected/0625c3f2-65a8-4439-990d-21c3f2195b00-kube-api-access-8q5h2\") pod \"calico-apiserver-67dfcc97d4-xs5fw\" (UID: \"0625c3f2-65a8-4439-990d-21c3f2195b00\") " pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" Oct 2 20:38:51.613404 kubelet[2504]: I1002 20:38:51.613394 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m9c5n\" (UniqueName: \"kubernetes.io/projected/2da1699c-7287-4f5f-b5d9-8b55e35a4041-kube-api-access-m9c5n\") pod \"calico-apiserver-67dfcc97d4-6mwm7\" (UID: \"2da1699c-7287-4f5f-b5d9-8b55e35a4041\") " pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" Oct 2 20:38:51.613508 kubelet[2504]: I1002 20:38:51.613499 2504 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2da1699c-7287-4f5f-b5d9-8b55e35a4041-calico-apiserver-certs\") pod \"calico-apiserver-67dfcc97d4-6mwm7\" (UID: \"2da1699c-7287-4f5f-b5d9-8b55e35a4041\") " pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" Oct 2 20:38:51.649000 audit[4222]: NETFILTER_CFG table=filter:126 family=2 entries=7 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.654598 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 2 20:38:51.654690 kernel: audit: type=1325 audit(1696279131.649:1323): table=filter:126 family=2 entries=7 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.649000 audit[4222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe3f340f0 a2=0 a3=ffff9a8016c0 items=0 ppid=2702 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.694755 kernel: audit: type=1300 audit(1696279131.649:1323): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe3f340f0 a2=0 a3=ffff9a8016c0 items=0 ppid=2702 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.708756 kernel: audit: type=1327 audit(1696279131.649:1323): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.653000 audit[4222]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.714537 kubelet[2504]: E1002 20:38:51.714501 2504 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 20:38:51.714777 kubelet[2504]: E1002 20:38:51.714763 2504 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2da1699c-7287-4f5f-b5d9-8b55e35a4041-calico-apiserver-certs podName:2da1699c-7287-4f5f-b5d9-8b55e35a4041 nodeName:}" failed. No retries permitted until 2023-10-02 20:38:52.214724199 +0000 UTC m=+54.865899883 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2da1699c-7287-4f5f-b5d9-8b55e35a4041-calico-apiserver-certs") pod "calico-apiserver-67dfcc97d4-6mwm7" (UID: "2da1699c-7287-4f5f-b5d9-8b55e35a4041") : secret "calico-apiserver-certs" not found Oct 2 20:38:51.715425 kubelet[2504]: E1002 20:38:51.715408 2504 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 20:38:51.715599 kubelet[2504]: E1002 20:38:51.715587 2504 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/0625c3f2-65a8-4439-990d-21c3f2195b00-calico-apiserver-certs podName:0625c3f2-65a8-4439-990d-21c3f2195b00 nodeName:}" failed. No retries permitted until 2023-10-02 20:38:52.215571207 +0000 UTC m=+54.866746931 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/0625c3f2-65a8-4439-990d-21c3f2195b00-calico-apiserver-certs") pod "calico-apiserver-67dfcc97d4-xs5fw" (UID: "0625c3f2-65a8-4439-990d-21c3f2195b00") : secret "calico-apiserver-certs" not found Oct 2 20:38:51.724170 kernel: audit: type=1325 audit(1696279131.653:1324): table=nat:127 family=2 entries=78 op=nft_register_rule pid=4222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.653000 audit[4222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe3f340f0 a2=0 a3=ffff9a8016c0 items=0 ppid=2702 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.754864 kernel: audit: type=1300 audit(1696279131.653:1324): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe3f340f0 a2=0 a3=ffff9a8016c0 items=0 ppid=2702 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.776743 kernel: audit: type=1327 audit(1696279131.653:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.819000 audit[4250]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.819000 audit[4250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff62b7980 a2=0 a3=ffff856276c0 items=0 ppid=2702 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.863763 kernel: audit: type=1325 audit(1696279131.819:1325): table=filter:128 family=2 entries=8 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.863892 kernel: audit: type=1300 audit(1696279131.819:1325): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff62b7980 a2=0 a3=ffff856276c0 items=0 ppid=2702 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.877327 kernel: audit: type=1327 audit(1696279131.819:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.836000 audit[4250]: NETFILTER_CFG table=nat:129 family=2 entries=78 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.836000 audit[4250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff62b7980 a2=0 a3=ffff856276c0 items=0 ppid=2702 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.894344 kernel: audit: type=1325 audit(1696279131.836:1326): table=nat:129 family=2 entries=78 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:52.466843 env[1352]: time="2023-10-02T20:38:52.466467677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67dfcc97d4-xs5fw,Uid:0625c3f2-65a8-4439-990d-21c3f2195b00,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:52.479290 env[1352]: time="2023-10-02T20:38:52.479229909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67dfcc97d4-6mwm7,Uid:2da1699c-7287-4f5f-b5d9-8b55e35a4041,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:52.664605 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali818b7ba44dc: link becomes ready Oct 2 20:38:52.658248 systemd-networkd[1494]: cali818b7ba44dc: Link UP Oct 2 20:38:52.664406 systemd-networkd[1494]: cali818b7ba44dc: Gained carrier Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.552 [INFO][4253] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0 calico-apiserver-67dfcc97d4- calico-apiserver 0625c3f2-65a8-4439-990d-21c3f2195b00 772 0 2023-10-02 20:38:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67dfcc97d4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 calico-apiserver-67dfcc97d4-xs5fw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali818b7ba44dc [] []}} ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.552 [INFO][4253] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.601 [INFO][4275] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" HandleID="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.614 [INFO][4275] ipam_plugin.go 269: Auto assigning IP ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" HandleID="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005330a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-f31f601c03", "pod":"calico-apiserver-67dfcc97d4-xs5fw", "timestamp":"2023-10-02 20:38:52.601205355 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:52.679283 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:52.679283 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.615 [INFO][4275] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.617 [INFO][4275] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.622 [INFO][4275] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.625 [INFO][4275] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.627 [INFO][4275] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.629 [INFO][4275] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.629 [INFO][4275] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.631 [INFO][4275] ipam.go 1682: Creating new handle: k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5 Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.637 [INFO][4275] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.644 [INFO][4275] ipam.go 1216: Successfully claimed IPs: [192.168.60.133/26] block=192.168.60.128/26 handle="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.644 [INFO][4275] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.133/26] handle="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.679283 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:52.679283 env[1352]: 2023-10-02 20:38:52.644 [INFO][4275] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.133/26] IPv6=[] ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" HandleID="k8s-pod-network.27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.646 [INFO][4253] k8s.go 383: Populated endpoint ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0", GenerateName:"calico-apiserver-67dfcc97d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"0625c3f2-65a8-4439-990d-21c3f2195b00", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67dfcc97d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"calico-apiserver-67dfcc97d4-xs5fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.60.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali818b7ba44dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.646 [INFO][4253] k8s.go 384: Calico CNI using IPs: [192.168.60.133/32] ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.646 [INFO][4253] dataplane_linux.go 68: Setting the host side veth name to cali818b7ba44dc ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.647 [INFO][4253] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.664 [INFO][4253] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0", GenerateName:"calico-apiserver-67dfcc97d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"0625c3f2-65a8-4439-990d-21c3f2195b00", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67dfcc97d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5", Pod:"calico-apiserver-67dfcc97d4-xs5fw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.60.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali818b7ba44dc", MAC:"46:66:b1:44:6f:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.679837 env[1352]: 2023-10-02 20:38:52.677 [INFO][4253] k8s.go 489: Wrote updated endpoint to datastore ContainerID="27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-xs5fw" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--xs5fw-eth0" Oct 2 20:38:52.716020 env[1352]: time="2023-10-02T20:38:52.715852631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:52.716020 env[1352]: time="2023-10-02T20:38:52.715915195Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:52.716020 env[1352]: time="2023-10-02T20:38:52.715926115Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:52.719644 env[1352]: time="2023-10-02T20:38:52.716527949Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5 pid=4307 runtime=io.containerd.runc.v2 Oct 2 20:38:52.722570 systemd-networkd[1494]: cali10b59904a1e: Link UP Oct 2 20:38:52.722575 systemd-networkd[1494]: cali10b59904a1e: Gained carrier Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.581 [INFO][4262] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0 calico-apiserver-67dfcc97d4- calico-apiserver 2da1699c-7287-4f5f-b5d9-8b55e35a4041 776 0 2023-10-02 20:38:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67dfcc97d4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-f31f601c03 calico-apiserver-67dfcc97d4-6mwm7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali10b59904a1e [] []}} ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.581 [INFO][4262] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.638 [INFO][4281] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" HandleID="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.661 [INFO][4281] ipam_plugin.go 269: Auto assigning IP ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" HandleID="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004dd10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-f31f601c03", "pod":"calico-apiserver-67dfcc97d4-6mwm7", "timestamp":"2023-10-02 20:38:52.638323466 +0000 UTC"}, Hostname:"ci-3510.3.0-a-f31f601c03", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:52.744282 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:52.744282 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.661 [INFO][4281] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-f31f601c03' Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.666 [INFO][4281] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.684 [INFO][4281] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.689 [INFO][4281] ipam.go 489: Trying affinity for 192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.692 [INFO][4281] ipam.go 155: Attempting to load block cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.695 [INFO][4281] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.60.128/26 host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.695 [INFO][4281] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.60.128/26 handle="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.697 [INFO][4281] ipam.go 1682: Creating new handle: k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.701 [INFO][4281] ipam.go 1203: Writing block in order to claim IPs block=192.168.60.128/26 handle="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.711 [INFO][4281] ipam.go 1216: Successfully claimed IPs: [192.168.60.134/26] block=192.168.60.128/26 handle="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.711 [INFO][4281] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.60.134/26] handle="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" host="ci-3510.3.0-a-f31f601c03" Oct 2 20:38:52.744282 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:52.744282 env[1352]: 2023-10-02 20:38:52.711 [INFO][4281] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.60.134/26] IPv6=[] ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" HandleID="k8s-pod-network.4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Workload="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.714 [INFO][4262] k8s.go 383: Populated endpoint ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0", GenerateName:"calico-apiserver-67dfcc97d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"2da1699c-7287-4f5f-b5d9-8b55e35a4041", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67dfcc97d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"", Pod:"calico-apiserver-67dfcc97d4-6mwm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.60.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10b59904a1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.714 [INFO][4262] k8s.go 384: Calico CNI using IPs: [192.168.60.134/32] ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.714 [INFO][4262] dataplane_linux.go 68: Setting the host side veth name to cali10b59904a1e ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.715 [INFO][4262] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.723 [INFO][4262] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0", GenerateName:"calico-apiserver-67dfcc97d4-", Namespace:"calico-apiserver", SelfLink:"", UID:"2da1699c-7287-4f5f-b5d9-8b55e35a4041", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67dfcc97d4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-f31f601c03", ContainerID:"4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c", Pod:"calico-apiserver-67dfcc97d4-6mwm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.60.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali10b59904a1e", MAC:"32:fa:79:60:84:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.744848 env[1352]: 2023-10-02 20:38:52.738 [INFO][4262] k8s.go 489: Wrote updated endpoint to datastore ContainerID="4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c" Namespace="calico-apiserver" Pod="calico-apiserver-67dfcc97d4-6mwm7" WorkloadEndpoint="ci--3510.3.0--a--f31f601c03-k8s-calico--apiserver--67dfcc97d4--6mwm7-eth0" Oct 2 20:38:52.756393 systemd[1]: Started cri-containerd-27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5.scope. Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit: BPF prog-id=180 op=LOAD Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4307 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653261646534623063653765363361626164393030306632656162 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4307 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653261646534623063653765363361626164393030306632656162 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit: BPF prog-id=181 op=LOAD Oct 2 20:38:52.781000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4307 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653261646534623063653765363361626164393030306632656162 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.781000 audit: BPF prog-id=182 op=LOAD Oct 2 20:38:52.781000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4307 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653261646534623063653765363361626164393030306632656162 Oct 2 20:38:52.781000 audit: BPF prog-id=182 op=UNLOAD Oct 2 20:38:52.781000 audit: BPF prog-id=181 op=UNLOAD Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.782000 audit: BPF prog-id=183 op=LOAD Oct 2 20:38:52.782000 audit[4317]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4307 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653261646534623063653765363361626164393030306632656162 Oct 2 20:38:52.790000 audit[4353]: NETFILTER_CFG table=filter:130 family=2 entries=59 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:52.790000 audit[4353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffdb5985b0 a2=0 a3=ffff9a4a4fa0 items=0 ppid=3410 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:52.801962 env[1352]: time="2023-10-02T20:38:52.801639018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:52.801962 env[1352]: time="2023-10-02T20:38:52.801681060Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:52.801962 env[1352]: time="2023-10-02T20:38:52.801692421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:52.802296 env[1352]: time="2023-10-02T20:38:52.802212090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c pid=4354 runtime=io.containerd.runc.v2 Oct 2 20:38:52.838303 systemd[1]: Started cri-containerd-4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c.scope. Oct 2 20:38:52.839000 audit[4378]: NETFILTER_CFG table=filter:131 family=2 entries=50 op=nft_register_chain pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:52.839000 audit[4378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffdfa26ac0 a2=0 a3=ffffbbefefa0 items=0 ppid=3410 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.839000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:52.851045 env[1352]: time="2023-10-02T20:38:52.850995211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67dfcc97d4-xs5fw,Uid:0625c3f2-65a8-4439-990d-21c3f2195b00,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"27e2ade4b0ce7e63abad9000f2eabe0ba7d32034dac637569c6fd4f81b6a99d5\"" Oct 2 20:38:52.852688 env[1352]: time="2023-10-02T20:38:52.852655984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit: BPF prog-id=184 op=LOAD Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463356463636535373665353436373737383166393431303661666562 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463356463636535373665353436373737383166393431303661666562 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit: BPF prog-id=185 op=LOAD Oct 2 20:38:52.864000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463356463636535373665353436373737383166393431303661666562 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit: BPF prog-id=186 op=LOAD Oct 2 20:38:52.864000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463356463636535373665353436373737383166393431303661666562 Oct 2 20:38:52.864000 audit: BPF prog-id=186 op=UNLOAD Oct 2 20:38:52.864000 audit: BPF prog-id=185 op=UNLOAD Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.864000 audit: BPF prog-id=187 op=LOAD Oct 2 20:38:52.864000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463356463636535373665353436373737383166393431303661666562 Oct 2 20:38:52.892481 env[1352]: time="2023-10-02T20:38:52.892434963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67dfcc97d4-6mwm7,Uid:2da1699c-7287-4f5f-b5d9-8b55e35a4041,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4c5dcce576e54677781f94106afeb6b18dca14f4753693a016e9ee071695fb4c\"" Oct 2 20:38:53.045000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:53.045000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40023de480 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:53.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:53.054732 env[1352]: time="2023-10-02T20:38:53.054678304Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:53.056732 env[1352]: time="2023-10-02T20:38:53.056695375Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:53.057131 kubelet[2504]: E1002 20:38:53.056952 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.057131 kubelet[2504]: E1002 20:38:53.056992 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.057588 kubelet[2504]: E1002 20:38:53.057178 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8q5h2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-xs5fw_calico-apiserver(0625c3f2-65a8-4439-990d-21c3f2195b00): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:53.057588 kubelet[2504]: E1002 20:38:53.057233 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:38:53.057813 env[1352]: time="2023-10-02T20:38:53.057784915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:53.057000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:53.057000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40025a0f90 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:53.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:53.216862 env[1352]: time="2023-10-02T20:38:53.216801572Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:53.219482 env[1352]: time="2023-10-02T20:38:53.219443278Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:53.219876 kubelet[2504]: E1002 20:38:53.219663 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.219876 kubelet[2504]: E1002 20:38:53.219700 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.219876 kubelet[2504]: E1002 20:38:53.219811 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m9c5n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-6mwm7_calico-apiserver(2da1699c-7287-4f5f-b5d9-8b55e35a4041): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:53.219876 kubelet[2504]: E1002 20:38:53.219846 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:38:53.746036 kubelet[2504]: E1002 20:38:53.744214 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:38:53.746473 kubelet[2504]: E1002 20:38:53.746447 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:38:53.827000 audit[4422]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.827000 audit[4422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffeee415b0 a2=0 a3=ffff922d36c0 items=0 ppid=2702 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:53.829000 audit[4422]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.829000 audit[4422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffeee415b0 a2=0 a3=ffff922d36c0 items=0 ppid=2702 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:53.884000 audit[4450]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.884000 audit[4450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe96135d0 a2=0 a3=ffff9e9416c0 items=0 ppid=2702 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:53.885000 audit[4450]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.885000 audit[4450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe96135d0 a2=0 a3=ffff9e9416c0 items=0 ppid=2702 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:54.301000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.301000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40114c59b0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.316000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.316000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40114c59e0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40024ca540 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40119b8960 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.445000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.445000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:54.445000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4002338ec0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.445000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.445000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4010d18e40 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:38:54.445000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:54.600462 systemd-networkd[1494]: cali818b7ba44dc: Gained IPv6LL Oct 2 20:38:54.728421 systemd-networkd[1494]: cali10b59904a1e: Gained IPv6LL Oct 2 20:38:54.748987 kubelet[2504]: E1002 20:38:54.748709 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:38:54.748987 kubelet[2504]: E1002 20:38:54.748944 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:38:55.557319 env[1352]: time="2023-10-02T20:38:55.557251983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:38:55.715246 env[1352]: time="2023-10-02T20:38:55.715180040Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:55.720156 env[1352]: time="2023-10-02T20:38:55.720098426Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:55.720409 kubelet[2504]: E1002 20:38:55.720381 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:55.720499 kubelet[2504]: E1002 20:38:55.720428 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:55.720537 kubelet[2504]: E1002 20:38:55.720518 2504 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:55.721485 env[1352]: time="2023-10-02T20:38:55.721294290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:38:55.878553 env[1352]: time="2023-10-02T20:38:55.878374101Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:55.881300 env[1352]: time="2023-10-02T20:38:55.881194214Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:55.881589 kubelet[2504]: E1002 20:38:55.881559 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:55.881846 kubelet[2504]: E1002 20:38:55.881601 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:55.881846 kubelet[2504]: E1002 20:38:55.881713 2504 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:55.881846 kubelet[2504]: E1002 20:38:55.881762 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:38:58.737000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.744559 kernel: kauditd_printk_skb: 158 callbacks suppressed Oct 2 20:38:58.744653 kernel: audit: type=1400 audit(1696279138.737:1377): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.737000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4002592a20 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.794096 kernel: audit: type=1300 audit(1696279138.737:1377): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4002592a20 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.794220 kernel: audit: type=1327 audit(1696279138.737:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.738000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.841713 kernel: audit: type=1400 audit(1696279138.738:1378): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.738000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40026258e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.870793 kernel: audit: type=1300 audit(1696279138.738:1378): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40026258e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.895219 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.25YSpE.mount: Deactivated successfully. Oct 2 20:38:58.896479 kernel: audit: type=1327 audit(1696279138.738:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.739000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.922236 kernel: audit: type=1400 audit(1696279138.739:1379): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.739000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4002592a60 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.951571 kernel: audit: type=1300 audit(1696279138.739:1379): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4002592a60 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.978248 kernel: audit: type=1327 audit(1696279138.739:1379): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:58.753000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:59.001786 kernel: audit: type=1400 audit(1696279138.753:1380): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:58.753000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4002625b20 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:38:58.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:05.557119 env[1352]: time="2023-10-02T20:39:05.557072189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:05.729690 env[1352]: time="2023-10-02T20:39:05.729627860Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:05.732512 env[1352]: time="2023-10-02T20:39:05.732478841Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:05.732739 kubelet[2504]: E1002 20:39:05.732716 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:05.733001 kubelet[2504]: E1002 20:39:05.732766 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:05.733843 kubelet[2504]: E1002 20:39:05.732882 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8q5h2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-xs5fw_calico-apiserver(0625c3f2-65a8-4439-990d-21c3f2195b00): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:05.733843 kubelet[2504]: E1002 20:39:05.733350 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:39:06.556412 env[1352]: time="2023-10-02T20:39:06.556356781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:06.727364 env[1352]: time="2023-10-02T20:39:06.727302705Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:06.731239 env[1352]: time="2023-10-02T20:39:06.731201736Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:06.731524 kubelet[2504]: E1002 20:39:06.731479 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:06.731628 kubelet[2504]: E1002 20:39:06.731541 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:06.731659 kubelet[2504]: E1002 20:39:06.731647 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m9c5n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-6mwm7_calico-apiserver(2da1699c-7287-4f5f-b5d9-8b55e35a4041): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:06.731745 kubelet[2504]: E1002 20:39:06.731685 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:39:08.557246 kubelet[2504]: E1002 20:39:08.557214 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:39:18.556319 kubelet[2504]: E1002 20:39:18.556231 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:39:18.900526 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.dOXfXx.mount: Deactivated successfully. Oct 2 20:39:20.556189 kubelet[2504]: E1002 20:39:20.556154 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:39:22.556678 env[1352]: time="2023-10-02T20:39:22.556437104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:39:22.740204 env[1352]: time="2023-10-02T20:39:22.739835622Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:22.743116 env[1352]: time="2023-10-02T20:39:22.743073445Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:22.743345 kubelet[2504]: E1002 20:39:22.743322 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:22.743602 kubelet[2504]: E1002 20:39:22.743363 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:22.743602 kubelet[2504]: E1002 20:39:22.743450 2504 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:22.744616 env[1352]: time="2023-10-02T20:39:22.744422264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:39:22.906504 env[1352]: time="2023-10-02T20:39:22.906415880Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:22.910107 env[1352]: time="2023-10-02T20:39:22.910053840Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:22.910491 kubelet[2504]: E1002 20:39:22.910474 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:22.910620 kubelet[2504]: E1002 20:39:22.910610 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:22.910792 kubelet[2504]: E1002 20:39:22.910780 2504 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:22.910990 kubelet[2504]: E1002 20:39:22.910976 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:39:29.558647 env[1352]: time="2023-10-02T20:39:29.558610596Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:29.724993 env[1352]: time="2023-10-02T20:39:29.724941118Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:29.729305 env[1352]: time="2023-10-02T20:39:29.729261542Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:29.729588 kubelet[2504]: E1002 20:39:29.729558 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:29.729848 kubelet[2504]: E1002 20:39:29.729601 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:29.729848 kubelet[2504]: E1002 20:39:29.729724 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8q5h2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-xs5fw_calico-apiserver(0625c3f2-65a8-4439-990d-21c3f2195b00): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:29.730130 kubelet[2504]: E1002 20:39:29.730105 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:39:35.558629 kubelet[2504]: E1002 20:39:35.558537 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:39:35.559428 env[1352]: time="2023-10-02T20:39:35.559257758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:35.716636 env[1352]: time="2023-10-02T20:39:35.716435077Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:35.719511 env[1352]: time="2023-10-02T20:39:35.719382277Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:35.719743 kubelet[2504]: E1002 20:39:35.719727 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:35.719846 kubelet[2504]: E1002 20:39:35.719836 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:35.720001 kubelet[2504]: E1002 20:39:35.719985 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m9c5n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-6mwm7_calico-apiserver(2da1699c-7287-4f5f-b5d9-8b55e35a4041): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:35.720164 kubelet[2504]: E1002 20:39:35.720151 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:39:43.557518 kubelet[2504]: E1002 20:39:43.557490 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:39:47.557606 kubelet[2504]: E1002 20:39:47.557568 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:39:48.412504 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.VWTEZV.mount: Deactivated successfully. Oct 2 20:39:49.405953 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.Acy4Ly.mount: Deactivated successfully. Oct 2 20:39:50.557147 kubelet[2504]: E1002 20:39:50.556963 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:39:53.044000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.051222 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:39:53.051332 kernel: audit: type=1400 audit(1696279193.044:1381): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.044000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000e459c0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:53.102633 kernel: audit: type=1300 audit(1696279193.044:1381): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000e459c0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:53.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:53.126971 kernel: audit: type=1327 audit(1696279193.044:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:53.127084 kernel: audit: type=1400 audit(1696279193.057:1382): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.057000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.057000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4001f45d70 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:53.177572 kernel: audit: type=1300 audit(1696279193.057:1382): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4001f45d70 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:53.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:53.201420 kernel: audit: type=1327 audit(1696279193.057:1382): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:54.302000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.302000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40117ccb40 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.353733 kernel: audit: type=1400 audit(1696279194.302:1383): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.353851 kernel: audit: type=1300 audit(1696279194.302:1383): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40117ccb40 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.377340 kernel: audit: type=1327 audit(1696279194.302:1383): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.316000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.399928 kernel: audit: type=1400 audit(1696279194.316:1384): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.316000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4011b805a0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40117ccb70 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4002875320 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.446000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.446000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4011d04030 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:54.446000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:54.446000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4002875a20 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:39:54.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:58.411612 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.L12hTY.mount: Deactivated successfully. Oct 2 20:39:58.557318 kubelet[2504]: E1002 20:39:58.556967 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:39:58.739000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.745387 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:39:58.745452 kernel: audit: type=1400 audit(1696279198.739:1389): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.739000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000e45f00 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.794771 kernel: audit: type=1300 audit(1696279198.739:1389): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000e45f00 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.819130 kernel: audit: type=1327 audit(1696279198.739:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.819234 kernel: audit: type=1400 audit(1696279198.739:1390): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.739000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.739000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400101c020 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.869315 kernel: audit: type=1300 audit(1696279198.739:1390): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400101c020 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.889902 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.ppRylE.mount: Deactivated successfully. Oct 2 20:39:58.895465 kernel: audit: type=1327 audit(1696279198.739:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.744000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.919417 kernel: audit: type=1400 audit(1696279198.744:1391): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.744000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400101c860 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.949210 kernel: audit: type=1300 audit(1696279198.744:1391): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400101c860 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.976712 kernel: audit: type=1327 audit(1696279198.744:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:58.754000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:59.001027 kernel: audit: type=1400 audit(1696279198.754:1392): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:58.754000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400101c8c0 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:39:58.754000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:00.556421 kubelet[2504]: E1002 20:40:00.556387 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:40:05.557672 env[1352]: time="2023-10-02T20:40:05.557631837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:05.715807 env[1352]: time="2023-10-02T20:40:05.715731584Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:05.721317 env[1352]: time="2023-10-02T20:40:05.721262742Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:05.721515 kubelet[2504]: E1002 20:40:05.721487 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:05.721753 kubelet[2504]: E1002 20:40:05.721530 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:05.721753 kubelet[2504]: E1002 20:40:05.721616 2504 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:05.722682 env[1352]: time="2023-10-02T20:40:05.722655389Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:05.876132 env[1352]: time="2023-10-02T20:40:05.876072332Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:05.878821 env[1352]: time="2023-10-02T20:40:05.878766285Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:05.879165 kubelet[2504]: E1002 20:40:05.879139 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:05.879252 kubelet[2504]: E1002 20:40:05.879180 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:05.879318 kubelet[2504]: E1002 20:40:05.879283 2504 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xmlnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-w2gvb_calico-system(b713aed7-6c79-45d2-97b6-d00ab0da3f32): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:05.879410 kubelet[2504]: E1002 20:40:05.879339 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:40:05.898614 systemd[1]: Started sshd@7-10.200.20.37:22-10.200.12.6:48486.service. Oct 2 20:40:05.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.12.6:48486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.906432 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:40:05.906540 kernel: audit: type=1130 audit(1696279205.898:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.12.6:48486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:06.325000 audit[4930]: USER_ACCT pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.328230 sshd[4930]: Accepted publickey for core from 10.200.12.6 port 48486 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:06.331148 sshd[4930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:06.326000 audit[4930]: CRED_ACQ pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.373131 kernel: audit: type=1101 audit(1696279206.325:1394): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.373286 kernel: audit: type=1103 audit(1696279206.326:1395): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.378238 systemd[1]: Started session-10.scope. Oct 2 20:40:06.379313 systemd-logind[1338]: New session 10 of user core. Oct 2 20:40:06.387180 kernel: audit: type=1006 audit(1696279206.326:1396): pid=4930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 20:40:06.326000 audit[4930]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2cacdc0 a2=3 a3=1 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:06.411715 kernel: audit: type=1300 audit(1696279206.326:1396): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2cacdc0 a2=3 a3=1 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:06.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:06.421018 kernel: audit: type=1327 audit(1696279206.326:1396): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:06.386000 audit[4930]: USER_START pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.446712 kernel: audit: type=1105 audit(1696279206.386:1397): pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.386000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.467665 kernel: audit: type=1103 audit(1696279206.386:1398): pid=4932 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.785852 sshd[4930]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:06.785000 audit[4930]: USER_END pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.790084 systemd-logind[1338]: Session 10 logged out. Waiting for processes to exit. Oct 2 20:40:06.791002 systemd[1]: sshd@7-10.200.20.37:22-10.200.12.6:48486.service: Deactivated successfully. Oct 2 20:40:06.791869 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 20:40:06.793400 systemd-logind[1338]: Removed session 10. Oct 2 20:40:06.785000 audit[4930]: CRED_DISP pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.836035 kernel: audit: type=1106 audit(1696279206.785:1399): pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.836170 kernel: audit: type=1104 audit(1696279206.785:1400): pid=4930 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.12.6:48486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:08.411820 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.o6baYn.mount: Deactivated successfully. Oct 2 20:40:09.407074 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.gLPbia.mount: Deactivated successfully. Oct 2 20:40:13.557473 env[1352]: time="2023-10-02T20:40:13.557425235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:13.558548 kubelet[2504]: E1002 20:40:13.558492 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:40:13.707743 env[1352]: time="2023-10-02T20:40:13.707683150Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:13.710855 env[1352]: time="2023-10-02T20:40:13.710809889Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:13.711054 kubelet[2504]: E1002 20:40:13.711037 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:13.711173 kubelet[2504]: E1002 20:40:13.711163 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:13.711381 kubelet[2504]: E1002 20:40:13.711366 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8q5h2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-xs5fw_calico-apiserver(0625c3f2-65a8-4439-990d-21c3f2195b00): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:13.711553 kubelet[2504]: E1002 20:40:13.711540 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:40:16.860498 systemd[1]: Started sshd@8-10.200.20.37:22-10.200.12.6:52808.service. Oct 2 20:40:16.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.12.6:52808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:16.871502 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:16.871608 kernel: audit: type=1130 audit(1696279216.866:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.12.6:52808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:17.315000 audit[5020]: USER_ACCT pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.316166 sshd[5020]: Accepted publickey for core from 10.200.12.6 port 52808 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:17.318787 sshd[5020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:17.318000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.361589 kernel: audit: type=1101 audit(1696279217.315:1403): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.361681 kernel: audit: type=1103 audit(1696279217.318:1404): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.375806 kernel: audit: type=1006 audit(1696279217.318:1405): pid=5020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 20:40:17.318000 audit[5020]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcaecc5d0 a2=3 a3=1 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.400557 kernel: audit: type=1300 audit(1696279217.318:1405): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcaecc5d0 a2=3 a3=1 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:17.410670 kernel: audit: type=1327 audit(1696279217.318:1405): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:17.411507 systemd-logind[1338]: New session 11 of user core. Oct 2 20:40:17.412067 systemd[1]: Started session-11.scope. Oct 2 20:40:17.416000 audit[5020]: USER_START pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.419000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.463332 kernel: audit: type=1105 audit(1696279217.416:1406): pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.463512 kernel: audit: type=1103 audit(1696279217.419:1407): pid=5022 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.755472 sshd[5020]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:17.755000 audit[5020]: USER_END pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.758768 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 20:40:17.759570 systemd[1]: sshd@8-10.200.20.37:22-10.200.12.6:52808.service: Deactivated successfully. Oct 2 20:40:17.756000 audit[5020]: CRED_DISP pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.804941 kernel: audit: type=1106 audit(1696279217.755:1408): pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.805082 kernel: audit: type=1104 audit(1696279217.756:1409): pid=5020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.805037 systemd-logind[1338]: Session 11 logged out. Waiting for processes to exit. Oct 2 20:40:17.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.12.6:52808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:17.805925 systemd-logind[1338]: Removed session 11. Oct 2 20:40:20.556824 kubelet[2504]: E1002 20:40:20.556798 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:40:26.557055 env[1352]: time="2023-10-02T20:40:26.556869881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:26.746275 env[1352]: time="2023-10-02T20:40:26.746202769Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:26.748922 env[1352]: time="2023-10-02T20:40:26.748884110Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:26.749131 kubelet[2504]: E1002 20:40:26.749114 2504 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:26.749444 kubelet[2504]: E1002 20:40:26.749431 2504 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:26.749659 kubelet[2504]: E1002 20:40:26.749645 2504 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m9c5n,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-67dfcc97d4-6mwm7_calico-apiserver(2da1699c-7287-4f5f-b5d9-8b55e35a4041): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:26.749831 kubelet[2504]: E1002 20:40:26.749817 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:40:27.557927 kubelet[2504]: E1002 20:40:27.557899 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:40:27.825411 systemd[1]: Started sshd@9-10.200.20.37:22-10.200.12.6:40044.service. Oct 2 20:40:27.852618 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:27.852766 kernel: audit: type=1130 audit(1696279227.825:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.12.6:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:27.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.12.6:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.246000 audit[5096]: USER_ACCT pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.252487 sshd[5096]: Accepted publickey for core from 10.200.12.6 port 40044 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:28.254728 sshd[5096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:28.253000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.296742 kernel: audit: type=1101 audit(1696279228.246:1412): pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.296876 kernel: audit: type=1103 audit(1696279228.253:1413): pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.312134 kernel: audit: type=1006 audit(1696279228.253:1414): pid=5096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 20:40:28.253000 audit[5096]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfd7a850 a2=3 a3=1 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:28.337001 kernel: audit: type=1300 audit(1696279228.253:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfd7a850 a2=3 a3=1 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:28.340673 systemd[1]: Started session-12.scope. Oct 2 20:40:28.341646 systemd-logind[1338]: New session 12 of user core. Oct 2 20:40:28.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:28.353554 kernel: audit: type=1327 audit(1696279228.253:1414): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:28.353000 audit[5096]: USER_START pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.382300 kernel: audit: type=1105 audit(1696279228.353:1415): pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.381000 audit[5101]: CRED_ACQ pid=5101 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.406291 kernel: audit: type=1103 audit(1696279228.381:1416): pid=5101 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.429829 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.wKm0oe.mount: Deactivated successfully. Oct 2 20:40:28.696488 sshd[5096]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:28.696000 audit[5096]: USER_END pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.696000 audit[5096]: CRED_DISP pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.725106 systemd[1]: sshd@9-10.200.20.37:22-10.200.12.6:40044.service: Deactivated successfully. Oct 2 20:40:28.726063 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 20:40:28.746402 kernel: audit: type=1106 audit(1696279228.696:1417): pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.746529 kernel: audit: type=1104 audit(1696279228.696:1418): pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.12.6:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.747123 systemd-logind[1338]: Session 12 logged out. Waiting for processes to exit. Oct 2 20:40:28.748028 systemd-logind[1338]: Removed session 12. Oct 2 20:40:28.766311 systemd[1]: Started sshd@10-10.200.20.37:22-10.200.12.6:40052.service. Oct 2 20:40:28.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.37:22-10.200.12.6:40052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.881895 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.MZFTRV.mount: Deactivated successfully. Oct 2 20:40:29.181000 audit[5136]: USER_ACCT pid=5136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.181858 sshd[5136]: Accepted publickey for core from 10.200.12.6 port 40052 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:29.183000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.183000 audit[5136]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd81ee760 a2=3 a3=1 items=0 ppid=1 pid=5136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:29.183770 sshd[5136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:29.187781 systemd-logind[1338]: New session 13 of user core. Oct 2 20:40:29.188446 systemd[1]: Started session-13.scope. Oct 2 20:40:29.192000 audit[5136]: USER_START pid=5136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.195000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.421581 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.VmuqFR.mount: Deactivated successfully. Oct 2 20:40:30.374330 sshd[5136]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:30.374000 audit[5136]: USER_END pid=5136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:30.374000 audit[5136]: CRED_DISP pid=5136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:30.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.37:22-10.200.12.6:40052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:30.377418 systemd-logind[1338]: Session 13 logged out. Waiting for processes to exit. Oct 2 20:40:30.377593 systemd[1]: sshd@10-10.200.20.37:22-10.200.12.6:40052.service: Deactivated successfully. Oct 2 20:40:30.378377 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 20:40:30.379819 systemd-logind[1338]: Removed session 13. Oct 2 20:40:30.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.37:22-10.200.12.6:40066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:30.449417 systemd[1]: Started sshd@11-10.200.20.37:22-10.200.12.6:40066.service. Oct 2 20:40:30.908388 sshd[5184]: Accepted publickey for core from 10.200.12.6 port 40066 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:30.908000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:30.909941 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:30.909000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:30.909000 audit[5184]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a1e510 a2=3 a3=1 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:30.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:30.914164 systemd-logind[1338]: New session 14 of user core. Oct 2 20:40:30.914670 systemd[1]: Started session-14.scope. Oct 2 20:40:30.918000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:30.921000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.306091 sshd[5184]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:31.306000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.306000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.309401 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 20:40:31.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.37:22-10.200.12.6:40066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:31.310096 systemd-logind[1338]: Session 14 logged out. Waiting for processes to exit. Oct 2 20:40:31.310233 systemd[1]: sshd@11-10.200.20.37:22-10.200.12.6:40066.service: Deactivated successfully. Oct 2 20:40:31.311488 systemd-logind[1338]: Removed session 14. Oct 2 20:40:34.557219 kubelet[2504]: E1002 20:40:34.557181 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:40:38.412816 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.KSSA91.mount: Deactivated successfully. Oct 2 20:40:39.407910 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.w95ZeT.mount: Deactivated successfully. Oct 2 20:40:40.556835 kubelet[2504]: E1002 20:40:40.556790 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:40:41.402004 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 20:40:41.402141 kernel: audit: type=1130 audit(1696279241.374:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.12.6:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:41.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.12.6:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:41.375579 systemd[1]: Started sshd@12-10.200.20.37:22-10.200.12.6:58904.service. Oct 2 20:40:41.557331 kubelet[2504]: E1002 20:40:41.557305 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:40:41.788000 audit[5262]: USER_ACCT pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.790209 sshd[5262]: Accepted publickey for core from 10.200.12.6 port 58904 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:41.792416 sshd[5262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:41.815293 kernel: audit: type=1101 audit(1696279241.788:1439): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.790000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.854898 kernel: audit: type=1103 audit(1696279241.790:1440): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.855031 kernel: audit: type=1006 audit(1696279241.790:1441): pid=5262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 20:40:41.790000 audit[5262]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5607870 a2=3 a3=1 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.883159 kernel: audit: type=1300 audit(1696279241.790:1441): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5607870 a2=3 a3=1 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:41.884024 systemd-logind[1338]: New session 15 of user core. Oct 2 20:40:41.884539 systemd[1]: Started session-15.scope. Oct 2 20:40:41.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:41.894726 kernel: audit: type=1327 audit(1696279241.790:1441): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:41.898000 audit[5262]: USER_START pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.927000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.929432 kernel: audit: type=1105 audit(1696279241.898:1442): pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:41.953342 kernel: audit: type=1103 audit(1696279241.927:1443): pid=5264 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.240014 sshd[5262]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:42.239000 audit[5262]: USER_END pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.242949 systemd-logind[1338]: Session 15 logged out. Waiting for processes to exit. Oct 2 20:40:42.244521 systemd[1]: sshd@12-10.200.20.37:22-10.200.12.6:58904.service: Deactivated successfully. Oct 2 20:40:42.245318 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 20:40:42.246879 systemd-logind[1338]: Removed session 15. Oct 2 20:40:42.239000 audit[5262]: CRED_DISP pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.288514 kernel: audit: type=1106 audit(1696279242.239:1444): pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.288645 kernel: audit: type=1104 audit(1696279242.239:1445): pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.12.6:58904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:48.557092 kubelet[2504]: E1002 20:40:48.556733 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:40:48.875468 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.LreBDp.mount: Deactivated successfully. Oct 2 20:40:49.407638 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.EwdAMt.mount: Deactivated successfully. Oct 2 20:40:51.558419 kubelet[2504]: E1002 20:40:51.558382 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:40:53.046000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:53.052839 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:53.052937 kernel: audit: type=1400 audit(1696279253.046:1447): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:53.046000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000fda500 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:53.107653 kernel: audit: type=1300 audit(1696279253.046:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000fda500 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:53.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:53.134384 kernel: audit: type=1327 audit(1696279253.046:1447): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:53.134525 kernel: audit: type=1400 audit(1696279253.058:1448): avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:53.058000 audit[2370]: AVC avc: denied { watch } for pid=2370 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:53.058000 audit[2370]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40029c9500 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:53.190837 kernel: audit: type=1300 audit(1696279253.058:1448): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40029c9500 a2=fc6 a3=0 items=0 ppid=2216 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:53.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:53.216807 kernel: audit: type=1327 audit(1696279253.058:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:54.303000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.303000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400cf3b170 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.357542 kernel: audit: type=1400 audit(1696279254.303:1449): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.357675 kernel: audit: type=1300 audit(1696279254.303:1449): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400cf3b170 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.357702 kernel: audit: type=1327 audit(1696279254.303:1449): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.303000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.317000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.407217 kernel: audit: type=1400 audit(1696279254.317:1450): avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.317000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400cf3b1a0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.317000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4002a7dea0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.320000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.320000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400db5ec00 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.446000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.446000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400286edc0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.446000 audit[2342]: AVC avc: denied { watch } for pid=2342 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:54.446000 audit[2342]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400db5ecc0 a2=fc6 a3=0 items=0 ppid=2196 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c429,c832 key=(null) Oct 2 20:40:54.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.556856 kubelet[2504]: E1002 20:40:54.556744 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:40:56.404012 systemd[1]: cri-containerd-7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7.scope: Deactivated successfully. Oct 2 20:40:56.404328 systemd[1]: cri-containerd-7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7.scope: Consumed 3.162s CPU time. Oct 2 20:40:56.408000 audit: BPF prog-id=87 op=UNLOAD Oct 2 20:40:56.408000 audit: BPF prog-id=107 op=UNLOAD Oct 2 20:40:56.430137 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7-rootfs.mount: Deactivated successfully. Oct 2 20:40:56.489000 audit: BPF prog-id=124 op=UNLOAD Oct 2 20:40:56.489092 systemd[1]: cri-containerd-ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85.scope: Deactivated successfully. Oct 2 20:40:56.489439 systemd[1]: cri-containerd-ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85.scope: Consumed 3.107s CPU time. Oct 2 20:40:56.492000 audit: BPF prog-id=127 op=UNLOAD Oct 2 20:40:56.504064 env[1352]: time="2023-10-02T20:40:56.504012479Z" level=info msg="shim disconnected" id=7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7 Oct 2 20:40:56.504064 env[1352]: time="2023-10-02T20:40:56.504063834Z" level=warning msg="cleaning up after shim disconnected" id=7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7 namespace=k8s.io Oct 2 20:40:56.504064 env[1352]: time="2023-10-02T20:40:56.504074873Z" level=info msg="cleaning up dead shim" Oct 2 20:40:56.523003 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85-rootfs.mount: Deactivated successfully. Oct 2 20:40:56.527546 env[1352]: time="2023-10-02T20:40:56.527501706Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5360 runtime=io.containerd.runc.v2\n" Oct 2 20:40:56.537611 env[1352]: time="2023-10-02T20:40:56.537570329Z" level=info msg="shim disconnected" id=ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85 Oct 2 20:40:56.537853 env[1352]: time="2023-10-02T20:40:56.537835306Z" level=warning msg="cleaning up after shim disconnected" id=ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85 namespace=k8s.io Oct 2 20:40:56.537936 env[1352]: time="2023-10-02T20:40:56.537923058Z" level=info msg="cleaning up dead shim" Oct 2 20:40:56.551744 env[1352]: time="2023-10-02T20:40:56.551703510Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5381 runtime=io.containerd.runc.v2\n" Oct 2 20:40:56.586818 kubelet[2504]: E1002 20:40:56.586606 2504 controller.go:187] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.37:38070->10.200.20.16:2379: read: connection timed out Oct 2 20:40:56.981037 kubelet[2504]: I1002 20:40:56.981000 2504 scope.go:115] "RemoveContainer" containerID="7ea9e3602f3b0d4123ac70e300912b5a58ab148766f06a73a3a1a972fa8310d7" Oct 2 20:40:56.982350 kubelet[2504]: I1002 20:40:56.982318 2504 scope.go:115] "RemoveContainer" containerID="ee3346dac766640e599ebea86126f2bc93a9aecf0cf62ddfd470ca25cda3fe85" Oct 2 20:40:56.983796 env[1352]: time="2023-10-02T20:40:56.983758022Z" level=info msg="CreateContainer within sandbox \"86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 20:40:56.984618 env[1352]: time="2023-10-02T20:40:56.984583988Z" level=info msg="CreateContainer within sandbox \"dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 20:40:57.007675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1994535866.mount: Deactivated successfully. Oct 2 20:40:57.025841 env[1352]: time="2023-10-02T20:40:57.025776753Z" level=info msg="CreateContainer within sandbox \"dbf54822c1e8b545acff9d54cd9a18f4451fdce5d0ae7b8eb00fe5bcd4a9046a\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"a9a6298580108eb211cc07a2512afb4df6ba75f4d103b31e5a63d5367d5c5774\"" Oct 2 20:40:57.026334 env[1352]: time="2023-10-02T20:40:57.026253072Z" level=info msg="StartContainer for \"a9a6298580108eb211cc07a2512afb4df6ba75f4d103b31e5a63d5367d5c5774\"" Oct 2 20:40:57.029932 env[1352]: time="2023-10-02T20:40:57.029888793Z" level=info msg="CreateContainer within sandbox \"86369dd28592f84b438b1f3d10feb71a441d337aa046c9507ae7ef2ff294113d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"c5535d8fc8b9d9981ec4c9cc20cddcdda9c9d2112649311a1286ad68a46b2180\"" Oct 2 20:40:57.030514 env[1352]: time="2023-10-02T20:40:57.030491780Z" level=info msg="StartContainer for \"c5535d8fc8b9d9981ec4c9cc20cddcdda9c9d2112649311a1286ad68a46b2180\"" Oct 2 20:40:57.048918 systemd[1]: Started cri-containerd-a9a6298580108eb211cc07a2512afb4df6ba75f4d103b31e5a63d5367d5c5774.scope. Oct 2 20:40:57.065885 systemd[1]: Started cri-containerd-c5535d8fc8b9d9981ec4c9cc20cddcdda9c9d2112649311a1286ad68a46b2180.scope. Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit: BPF prog-id=188 op=LOAD Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2656 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613632393835383031303865623231316363303761323531326166 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2656 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613632393835383031303865623231316363303761323531326166 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit: BPF prog-id=189 op=LOAD Oct 2 20:40:57.075000 audit[5407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2656 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613632393835383031303865623231316363303761323531326166 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit: BPF prog-id=190 op=LOAD Oct 2 20:40:57.075000 audit[5407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2656 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613632393835383031303865623231316363303761323531326166 Oct 2 20:40:57.075000 audit: BPF prog-id=190 op=UNLOAD Oct 2 20:40:57.075000 audit: BPF prog-id=189 op=UNLOAD Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.075000 audit: BPF prog-id=191 op=LOAD Oct 2 20:40:57.075000 audit[5407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2656 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613632393835383031303865623231316363303761323531326166 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.097000 audit: BPF prog-id=192 op=LOAD Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2216 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335353335643866633862396439393831656334633963633230636464 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2216 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335353335643866633862396439393831656334633963633230636464 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit: BPF prog-id=193 op=LOAD Oct 2 20:40:57.098000 audit[5417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2216 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335353335643866633862396439393831656334633963633230636464 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit: BPF prog-id=194 op=LOAD Oct 2 20:40:57.098000 audit[5417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2216 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335353335643866633862396439393831656334633963633230636464 Oct 2 20:40:57.098000 audit: BPF prog-id=194 op=UNLOAD Oct 2 20:40:57.098000 audit: BPF prog-id=193 op=UNLOAD Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { perfmon } for pid=5417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit[5417]: AVC avc: denied { bpf } for pid=5417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:57.098000 audit: BPF prog-id=195 op=LOAD Oct 2 20:40:57.098000 audit[5417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2216 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:57.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335353335643866633862396439393831656334633963633230636464 Oct 2 20:40:57.117441 env[1352]: time="2023-10-02T20:40:57.117398275Z" level=info msg="StartContainer for \"a9a6298580108eb211cc07a2512afb4df6ba75f4d103b31e5a63d5367d5c5774\" returns successfully" Oct 2 20:40:57.136733 env[1352]: time="2023-10-02T20:40:57.136676504Z" level=info msg="StartContainer for \"c5535d8fc8b9d9981ec4c9cc20cddcdda9c9d2112649311a1286ad68a46b2180\" returns successfully" Oct 2 20:40:57.144899 systemd[1]: cri-containerd-5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca.scope: Deactivated successfully. Oct 2 20:40:57.145192 systemd[1]: cri-containerd-5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca.scope: Consumed 2.353s CPU time. Oct 2 20:40:57.151000 audit: BPF prog-id=91 op=UNLOAD Oct 2 20:40:57.151000 audit: BPF prog-id=106 op=UNLOAD Oct 2 20:40:57.197894 env[1352]: time="2023-10-02T20:40:57.197828099Z" level=info msg="shim disconnected" id=5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca Oct 2 20:40:57.197894 env[1352]: time="2023-10-02T20:40:57.197882054Z" level=warning msg="cleaning up after shim disconnected" id=5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca namespace=k8s.io Oct 2 20:40:57.197894 env[1352]: time="2023-10-02T20:40:57.197892333Z" level=info msg="cleaning up dead shim" Oct 2 20:40:57.217284 env[1352]: time="2023-10-02T20:40:57.217229277Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5477 runtime=io.containerd.runc.v2\n" Oct 2 20:40:57.431842 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca-rootfs.mount: Deactivated successfully. Oct 2 20:40:57.985193 kubelet[2504]: I1002 20:40:57.985162 2504 scope.go:115] "RemoveContainer" containerID="5af0258ff1a52f64e328368958fa51190bb4c907c2dfcbda34f86a6634d535ca" Oct 2 20:40:57.986826 env[1352]: time="2023-10-02T20:40:57.986787203Z" level=info msg="CreateContainer within sandbox \"6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 20:40:58.014568 env[1352]: time="2023-10-02T20:40:58.014515709Z" level=info msg="CreateContainer within sandbox \"6b91af83d385713a725b1f9639eba27329dec71b3848b58fc80fa4fbeab75cfc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"5359c3cc303bc7e9b59e328e60cb2a4c55ec9c7fac305742d13dc7afca047244\"" Oct 2 20:40:58.014999 env[1352]: time="2023-10-02T20:40:58.014972310Z" level=info msg="StartContainer for \"5359c3cc303bc7e9b59e328e60cb2a4c55ec9c7fac305742d13dc7afca047244\"" Oct 2 20:40:58.049480 systemd[1]: Started cri-containerd-5359c3cc303bc7e9b59e328e60cb2a4c55ec9c7fac305742d13dc7afca047244.scope. Oct 2 20:40:58.112173 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 2 20:40:58.112333 kernel: audit: type=1400 audit(1696279258.086:1497): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.131410 kernel: audit: type=1400 audit(1696279258.086:1498): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.148869 kernel: audit: type=1400 audit(1696279258.086:1499): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.167399 kernel: audit: type=1400 audit(1696279258.086:1500): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.186225 kernel: audit: type=1400 audit(1696279258.086:1501): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.207583 kernel: audit: type=1400 audit(1696279258.086:1502): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.226053 kernel: audit: type=1400 audit(1696279258.086:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.244024 kernel: audit: type=1400 audit(1696279258.086:1504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.261806 kernel: audit: type=1400 audit(1696279258.086:1505): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.091000 audit: BPF prog-id=196 op=LOAD Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2244 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:58.290429 kernel: audit: type=1400 audit(1696279258.091:1506): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533353963336363333033626337653962353965333238653630636232 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2244 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533353963336363333033626337653962353965333238653630636232 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit: BPF prog-id=197 op=LOAD Oct 2 20:40:58.112000 audit[5502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2244 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533353963336363333033626337653962353965333238653630636232 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit: BPF prog-id=198 op=LOAD Oct 2 20:40:58.112000 audit[5502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2244 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533353963336363333033626337653962353965333238653630636232 Oct 2 20:40:58.112000 audit: BPF prog-id=198 op=UNLOAD Oct 2 20:40:58.112000 audit: BPF prog-id=197 op=UNLOAD Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { perfmon } for pid=5502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit[5502]: AVC avc: denied { bpf } for pid=5502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:58.112000 audit: BPF prog-id=199 op=LOAD Oct 2 20:40:58.112000 audit[5502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2244 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:58.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533353963336363333033626337653962353965333238653630636232 Oct 2 20:40:58.315096 env[1352]: time="2023-10-02T20:40:58.315048143Z" level=info msg="StartContainer for \"5359c3cc303bc7e9b59e328e60cb2a4c55ec9c7fac305742d13dc7afca047244\" returns successfully" Oct 2 20:40:58.882606 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.8VKuAQ.mount: Deactivated successfully. Oct 2 20:40:59.430416 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.2yeoQw.mount: Deactivated successfully. Oct 2 20:40:59.854000 audit[5438]: AVC avc: denied { watch } for pid=5438 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:59.854000 audit[5438]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40002feba0 a2=fc6 a3=0 items=0 ppid=2216 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:59.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:59.855000 audit[5438]: AVC avc: denied { watch } for pid=5438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:59.855000 audit[5438]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40001549c0 a2=fc6 a3=0 items=0 ppid=2216 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c665 key=(null) Oct 2 20:40:59.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:00.297987 kubelet[2504]: E1002 20:41:00.297821 2504 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-f31f601c03.178a64fd904aacea", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-f31f601c03", UID:"b3756fc2909a22add2550263fb5c7660", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-f31f601c03"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 40, 49, 868729578, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 40, 49, 868729578, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.37:37916->10.200.20.16:2379: read: connection timed out' (will not retry!) Oct 2 20:41:02.557023 kubelet[2504]: E1002 20:41:02.556987 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:41:03.558020 kubelet[2504]: E1002 20:41:03.557975 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:41:06.587168 kubelet[2504]: E1002 20:41:06.587121 2504 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:08.420104 systemd[1]: run-containerd-runc-k8s.io-f0cc7bcd87d0803fb56a2663f8df1d101f44fe7a7db84b6d91429b1373f638f1-runc.1YQSfT.mount: Deactivated successfully. Oct 2 20:41:08.557251 kubelet[2504]: E1002 20:41:08.557219 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-6mwm7" podUID=2da1699c-7287-4f5f-b5d9-8b55e35a4041 Oct 2 20:41:08.874919 systemd[1]: run-containerd-runc-k8s.io-7d061c6a1034de97e52f5ad740243438330424805edd06f904aa456abd3c827b-runc.Lt0MvA.mount: Deactivated successfully. Oct 2 20:41:16.556330 kubelet[2504]: E1002 20:41:16.556297 2504 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-67dfcc97d4-xs5fw" podUID=0625c3f2-65a8-4439-990d-21c3f2195b00 Oct 2 20:41:16.557043 kubelet[2504]: E1002 20:41:16.557024 2504 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-w2gvb" podUID=b713aed7-6c79-45d2-97b6-d00ab0da3f32 Oct 2 20:41:16.588421 kubelet[2504]: E1002 20:41:16.588383 2504 controller.go:187] failed to update lease, error: Put "https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-f31f601c03?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)