Oct 2 20:35:52.059401 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 20:35:52.059419 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 20:35:52.059427 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Oct 2 20:35:52.059434 kernel: printk: bootconsole [pl11] enabled Oct 2 20:35:52.059439 kernel: efi: EFI v2.70 by EDK II Oct 2 20:35:52.059444 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 Oct 2 20:35:52.059451 kernel: random: crng init done Oct 2 20:35:52.059456 kernel: ACPI: Early table checksum verification disabled Oct 2 20:35:52.059461 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL) Oct 2 20:35:52.059467 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059472 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059479 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 20:35:52.059484 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059490 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059496 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059502 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059508 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059515 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059521 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Oct 2 20:35:52.059526 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:52.059532 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Oct 2 20:35:52.059538 kernel: NUMA: Failed to initialise from firmware Oct 2 20:35:52.059544 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:52.059549 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Oct 2 20:35:52.059555 kernel: Zone ranges: Oct 2 20:35:52.059561 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Oct 2 20:35:52.059566 kernel: DMA32 empty Oct 2 20:35:52.059573 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:52.059579 kernel: Movable zone start for each node Oct 2 20:35:52.059585 kernel: Early memory node ranges Oct 2 20:35:52.059590 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Oct 2 20:35:52.059596 kernel: node 0: [mem 0x0000000000824000-0x000000003ec84fff] Oct 2 20:35:52.059602 kernel: node 0: [mem 0x000000003ec85000-0x000000003ecadfff] Oct 2 20:35:52.059607 kernel: node 0: [mem 0x000000003ecae000-0x000000003fd2dfff] Oct 2 20:35:52.059613 kernel: node 0: [mem 0x000000003fd2e000-0x000000003fd81fff] Oct 2 20:35:52.059618 kernel: node 0: [mem 0x000000003fd82000-0x000000003fd8dfff] Oct 2 20:35:52.059624 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fd91fff] Oct 2 20:35:52.059630 kernel: node 0: [mem 0x000000003fd92000-0x000000003fffffff] Oct 2 20:35:52.059635 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:52.059642 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:52.059650 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Oct 2 20:35:52.059656 kernel: psci: probing for conduit method from ACPI. Oct 2 20:35:52.059662 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 20:35:52.059668 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 20:35:52.059675 kernel: psci: MIGRATE_INFO_TYPE not supported. Oct 2 20:35:52.059681 kernel: psci: SMC Calling Convention v1.4 Oct 2 20:35:52.059687 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Oct 2 20:35:52.059693 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Oct 2 20:35:52.059699 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 20:35:52.059705 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 20:35:52.059711 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 20:35:52.059717 kernel: Detected PIPT I-cache on CPU0 Oct 2 20:35:52.059724 kernel: CPU features: detected: GIC system register CPU interface Oct 2 20:35:52.059730 kernel: CPU features: detected: Hardware dirty bit management Oct 2 20:35:52.059736 kernel: CPU features: detected: Spectre-BHB Oct 2 20:35:52.059742 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 20:35:52.059749 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 20:35:52.059755 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 20:35:52.059761 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Oct 2 20:35:52.059767 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Oct 2 20:35:52.059773 kernel: Policy zone: Normal Oct 2 20:35:52.059781 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:52.059787 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:35:52.059793 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 20:35:52.059799 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:35:52.059806 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:35:52.059813 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB) Oct 2 20:35:52.059819 kernel: Memory: 3992064K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202096K reserved, 0K cma-reserved) Oct 2 20:35:52.059826 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 20:35:52.059832 kernel: trace event string verifier disabled Oct 2 20:35:52.059838 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 20:35:52.059845 kernel: rcu: RCU event tracing is enabled. Oct 2 20:35:52.059851 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 20:35:52.059857 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 20:35:52.059864 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:35:52.059870 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:35:52.059876 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 20:35:52.059883 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 20:35:52.059889 kernel: GICv3: 960 SPIs implemented Oct 2 20:35:52.059895 kernel: GICv3: 0 Extended SPIs implemented Oct 2 20:35:52.059901 kernel: GICv3: Distributor has no Range Selector support Oct 2 20:35:52.059907 kernel: Root IRQ handler: gic_handle_irq Oct 2 20:35:52.059913 kernel: GICv3: 16 PPIs implemented Oct 2 20:35:52.059919 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Oct 2 20:35:52.059925 kernel: ITS: No ITS available, not enabling LPIs Oct 2 20:35:52.059932 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:52.059938 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 20:35:52.059944 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 20:35:52.059950 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 20:35:52.059958 kernel: Console: colour dummy device 80x25 Oct 2 20:35:52.059964 kernel: printk: console [tty1] enabled Oct 2 20:35:52.059971 kernel: ACPI: Core revision 20210730 Oct 2 20:35:52.059977 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 20:35:52.059984 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:35:52.059990 kernel: LSM: Security Framework initializing Oct 2 20:35:52.062389 kernel: SELinux: Initializing. Oct 2 20:35:52.062404 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:52.062411 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:52.062434 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Oct 2 20:35:52.062441 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0 Oct 2 20:35:52.062447 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:35:52.062453 kernel: Remapping and enabling EFI services. Oct 2 20:35:52.062459 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:35:52.062466 kernel: Detected PIPT I-cache on CPU1 Oct 2 20:35:52.062473 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Oct 2 20:35:52.062479 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:52.062486 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 20:35:52.062493 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 20:35:52.062500 kernel: SMP: Total of 2 processors activated. Oct 2 20:35:52.062506 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 20:35:52.062513 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Oct 2 20:35:52.062519 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 20:35:52.062526 kernel: CPU features: detected: CRC32 instructions Oct 2 20:35:52.062532 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 20:35:52.062538 kernel: CPU features: detected: LSE atomic instructions Oct 2 20:35:52.062544 kernel: CPU features: detected: Privileged Access Never Oct 2 20:35:52.062552 kernel: CPU: All CPU(s) started at EL1 Oct 2 20:35:52.062559 kernel: alternatives: patching kernel code Oct 2 20:35:52.062569 kernel: devtmpfs: initialized Oct 2 20:35:52.062577 kernel: KASLR enabled Oct 2 20:35:52.062584 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:35:52.062591 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 20:35:52.062597 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:35:52.062604 kernel: SMBIOS 3.1.0 present. Oct 2 20:35:52.062611 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022 Oct 2 20:35:52.062618 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:35:52.062626 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 20:35:52.062632 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 20:35:52.062639 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 20:35:52.062646 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:35:52.062653 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Oct 2 20:35:52.062659 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:35:52.062666 kernel: cpuidle: using governor menu Oct 2 20:35:52.062674 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 20:35:52.062680 kernel: ASID allocator initialised with 32768 entries Oct 2 20:35:52.062687 kernel: ACPI: bus type PCI registered Oct 2 20:35:52.062693 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:35:52.062700 kernel: Serial: AMBA PL011 UART driver Oct 2 20:35:52.062707 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:35:52.062714 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 20:35:52.062720 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:35:52.062727 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 20:35:52.062735 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:35:52.062741 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 20:35:52.062748 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:35:52.062754 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:35:52.062761 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:35:52.062768 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:35:52.062774 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:35:52.062781 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:35:52.062787 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:35:52.062795 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 20:35:52.062802 kernel: ACPI: Interpreter enabled Oct 2 20:35:52.062808 kernel: ACPI: Using GIC for interrupt routing Oct 2 20:35:52.062815 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Oct 2 20:35:52.062822 kernel: printk: console [ttyAMA0] enabled Oct 2 20:35:52.062828 kernel: printk: bootconsole [pl11] disabled Oct 2 20:35:52.062835 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Oct 2 20:35:52.062842 kernel: iommu: Default domain type: Translated Oct 2 20:35:52.062848 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 20:35:52.062856 kernel: vgaarb: loaded Oct 2 20:35:52.062863 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:35:52.062869 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:35:52.062876 kernel: PTP clock support registered Oct 2 20:35:52.062882 kernel: Registered efivars operations Oct 2 20:35:52.062889 kernel: No ACPI PMU IRQ for CPU0 Oct 2 20:35:52.062896 kernel: No ACPI PMU IRQ for CPU1 Oct 2 20:35:52.062902 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 20:35:52.062909 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:35:52.062917 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:35:52.062923 kernel: pnp: PnP ACPI init Oct 2 20:35:52.062930 kernel: pnp: PnP ACPI: found 0 devices Oct 2 20:35:52.062936 kernel: NET: Registered PF_INET protocol family Oct 2 20:35:52.062943 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:35:52.062950 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 20:35:52.062956 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:35:52.062963 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 20:35:52.062970 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 20:35:52.062978 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 20:35:52.062984 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:52.062991 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:52.063008 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:35:52.063015 kernel: PCI: CLS 0 bytes, default 64 Oct 2 20:35:52.063022 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Oct 2 20:35:52.063029 kernel: kvm [1]: HYP mode not available Oct 2 20:35:52.063035 kernel: Initialise system trusted keyrings Oct 2 20:35:52.063042 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 20:35:52.063050 kernel: Key type asymmetric registered Oct 2 20:35:52.063056 kernel: Asymmetric key parser 'x509' registered Oct 2 20:35:52.063063 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:35:52.063069 kernel: io scheduler mq-deadline registered Oct 2 20:35:52.063076 kernel: io scheduler kyber registered Oct 2 20:35:52.063083 kernel: io scheduler bfq registered Oct 2 20:35:52.063089 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:35:52.063096 kernel: thunder_xcv, ver 1.0 Oct 2 20:35:52.063102 kernel: thunder_bgx, ver 1.0 Oct 2 20:35:52.063110 kernel: nicpf, ver 1.0 Oct 2 20:35:52.063117 kernel: nicvf, ver 1.0 Oct 2 20:35:52.063300 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 20:35:52.063365 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:35:51 UTC (1696278951) Oct 2 20:35:52.063374 kernel: efifb: probing for efifb Oct 2 20:35:52.063381 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 20:35:52.063388 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 20:35:52.063394 kernel: efifb: scrolling: redraw Oct 2 20:35:52.063403 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 20:35:52.063410 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:35:52.063416 kernel: fb0: EFI VGA frame buffer device Oct 2 20:35:52.063423 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Oct 2 20:35:52.063430 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:35:52.063436 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:35:52.063443 kernel: Segment Routing with IPv6 Oct 2 20:35:52.063450 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:35:52.063456 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:35:52.063464 kernel: Key type dns_resolver registered Oct 2 20:35:52.063471 kernel: registered taskstats version 1 Oct 2 20:35:52.063477 kernel: Loading compiled-in X.509 certificates Oct 2 20:35:52.063484 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 20:35:52.063491 kernel: Key type .fscrypt registered Oct 2 20:35:52.063497 kernel: Key type fscrypt-provisioning registered Oct 2 20:35:52.063504 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 20:35:52.063511 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:35:52.063517 kernel: ima: No architecture policies found Oct 2 20:35:52.063525 kernel: Freeing unused kernel memory: 34560K Oct 2 20:35:52.063532 kernel: Run /init as init process Oct 2 20:35:52.063538 kernel: with arguments: Oct 2 20:35:52.063545 kernel: /init Oct 2 20:35:52.063551 kernel: with environment: Oct 2 20:35:52.063558 kernel: HOME=/ Oct 2 20:35:52.063564 kernel: TERM=linux Oct 2 20:35:52.063570 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:35:52.063579 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:35:52.063590 systemd[1]: Detected virtualization microsoft. Oct 2 20:35:52.063597 systemd[1]: Detected architecture arm64. Oct 2 20:35:52.063603 systemd[1]: Running in initrd. Oct 2 20:35:52.063610 systemd[1]: No hostname configured, using default hostname. Oct 2 20:35:52.063617 systemd[1]: Hostname set to . Oct 2 20:35:52.063624 systemd[1]: Initializing machine ID from random generator. Oct 2 20:35:52.063631 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:35:52.063639 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:35:52.063646 systemd[1]: Reached target cryptsetup.target. Oct 2 20:35:52.063654 systemd[1]: Reached target paths.target. Oct 2 20:35:52.063660 systemd[1]: Reached target slices.target. Oct 2 20:35:52.063667 systemd[1]: Reached target swap.target. Oct 2 20:35:52.063674 systemd[1]: Reached target timers.target. Oct 2 20:35:52.063682 systemd[1]: Listening on iscsid.socket. Oct 2 20:35:52.063689 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:35:52.063697 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:35:52.063704 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:35:52.063711 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:35:52.063718 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:35:52.063726 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:35:52.063733 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:35:52.063739 systemd[1]: Reached target sockets.target. Oct 2 20:35:52.063746 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:35:52.063753 systemd[1]: Finished network-cleanup.service. Oct 2 20:35:52.063762 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:35:52.063769 systemd[1]: Starting systemd-journald.service... Oct 2 20:35:52.063776 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:35:52.063783 systemd[1]: Starting systemd-resolved.service... Oct 2 20:35:52.063790 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:35:52.063797 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:35:52.063808 systemd-journald[275]: Journal started Oct 2 20:35:52.063847 systemd-journald[275]: Runtime Journal (/run/log/journal/983b8d59a9284652b47910fe20daaf8a) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:35:52.060025 systemd-modules-load[276]: Inserted module 'overlay' Oct 2 20:35:52.093225 systemd[1]: Started systemd-journald.service. Oct 2 20:35:52.093254 kernel: audit: type=1130 audit(1696278952.068:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.097804 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:35:52.132227 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:35:52.132249 kernel: audit: type=1130 audit(1696278952.097:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.128704 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:35:52.147907 kernel: Bridge firewalling registered Oct 2 20:35:52.143473 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:35:52.180614 kernel: audit: type=1130 audit(1696278952.127:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.146629 systemd-modules-load[276]: Inserted module 'br_netfilter' Oct 2 20:35:52.190855 kernel: SCSI subsystem initialized Oct 2 20:35:52.154346 systemd-resolved[277]: Positive Trust Anchors: Oct 2 20:35:52.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.154355 systemd-resolved[277]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:35:52.241416 kernel: audit: type=1130 audit(1696278952.141:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.241440 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:35:52.241451 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:35:52.241459 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:35:52.154383 systemd-resolved[277]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:35:52.158666 systemd-resolved[277]: Defaulting to hostname 'linux'. Oct 2 20:35:52.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.176034 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:35:52.195691 systemd[1]: Started systemd-resolved.service. Oct 2 20:35:52.323325 kernel: audit: type=1130 audit(1696278952.276:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.323352 kernel: audit: type=1130 audit(1696278952.304:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.232958 systemd-modules-load[276]: Inserted module 'dm_multipath' Oct 2 20:35:52.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.296102 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:35:52.372649 kernel: audit: type=1130 audit(1696278952.327:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.372671 kernel: audit: type=1130 audit(1696278952.353:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.304891 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:35:52.328104 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:35:52.353313 systemd[1]: Reached target nss-lookup.target. Oct 2 20:35:52.381124 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:35:52.399165 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:35:52.407391 dracut-cmdline[295]: dracut-dracut-053 Oct 2 20:35:52.413542 dracut-cmdline[295]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:52.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.447887 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:35:52.472850 kernel: audit: type=1130 audit(1696278952.451:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.566023 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:35:52.577016 kernel: iscsi: registered transport (tcp) Oct 2 20:35:52.596163 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:35:52.596189 kernel: QLogic iSCSI HBA Driver Oct 2 20:35:52.674234 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:35:52.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.679471 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:35:52.744017 kernel: raid6: neonx8 gen() 13806 MB/s Oct 2 20:35:52.764017 kernel: raid6: neonx8 xor() 10828 MB/s Oct 2 20:35:52.784006 kernel: raid6: neonx4 gen() 13576 MB/s Oct 2 20:35:52.805006 kernel: raid6: neonx4 xor() 11288 MB/s Oct 2 20:35:52.825009 kernel: raid6: neonx2 gen() 12959 MB/s Oct 2 20:35:52.845009 kernel: raid6: neonx2 xor() 10235 MB/s Oct 2 20:35:52.866006 kernel: raid6: neonx1 gen() 10529 MB/s Oct 2 20:35:52.886010 kernel: raid6: neonx1 xor() 8793 MB/s Oct 2 20:35:52.906009 kernel: raid6: int64x8 gen() 6295 MB/s Oct 2 20:35:52.927011 kernel: raid6: int64x8 xor() 3550 MB/s Oct 2 20:35:52.947006 kernel: raid6: int64x4 gen() 7218 MB/s Oct 2 20:35:52.968008 kernel: raid6: int64x4 xor() 3854 MB/s Oct 2 20:35:52.989011 kernel: raid6: int64x2 gen() 6152 MB/s Oct 2 20:35:53.009009 kernel: raid6: int64x2 xor() 3323 MB/s Oct 2 20:35:53.030006 kernel: raid6: int64x1 gen() 5047 MB/s Oct 2 20:35:53.055425 kernel: raid6: int64x1 xor() 2646 MB/s Oct 2 20:35:53.055448 kernel: raid6: using algorithm neonx8 gen() 13806 MB/s Oct 2 20:35:53.055464 kernel: raid6: .... xor() 10828 MB/s, rmw enabled Oct 2 20:35:53.059509 kernel: raid6: using neon recovery algorithm Oct 2 20:35:53.076008 kernel: xor: measuring software checksum speed Oct 2 20:35:53.084673 kernel: 8regs : 17311 MB/sec Oct 2 20:35:53.084684 kernel: 32regs : 20760 MB/sec Oct 2 20:35:53.092860 kernel: arm64_neon : 27778 MB/sec Oct 2 20:35:53.092870 kernel: xor: using function: arm64_neon (27778 MB/sec) Oct 2 20:35:53.148015 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 20:35:53.166446 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:35:53.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.173000 audit: BPF prog-id=7 op=LOAD Oct 2 20:35:53.173000 audit: BPF prog-id=8 op=LOAD Oct 2 20:35:53.175226 systemd[1]: Starting systemd-udevd.service... Oct 2 20:35:53.191578 systemd-udevd[474]: Using default interface naming scheme 'v252'. Oct 2 20:35:53.198295 systemd[1]: Started systemd-udevd.service. Oct 2 20:35:53.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.208591 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:35:53.235324 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Oct 2 20:35:53.285990 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:35:53.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.291554 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:35:53.335225 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:35:53.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.404028 kernel: hv_vmbus: Vmbus version:5.3 Oct 2 20:35:53.421179 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 20:35:53.421229 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Oct 2 20:35:53.421239 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 20:35:53.442014 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 20:35:53.442066 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 20:35:53.444016 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 20:35:53.460021 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Oct 2 20:35:53.468026 kernel: scsi host0: storvsc_host_t Oct 2 20:35:53.468190 kernel: scsi host1: storvsc_host_t Oct 2 20:35:53.468272 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 20:35:53.484025 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 20:35:53.500727 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 20:35:53.500912 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 20:35:53.508009 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 20:35:53.508161 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 20:35:53.508246 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:35:53.515642 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:35:53.522050 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 20:35:53.522162 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 20:35:53.528014 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:53.532003 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:35:53.579016 kernel: hv_netvsc 0022487a-eb87-0022-487a-eb870022487a eth0: VF slot 1 added Oct 2 20:35:53.593369 kernel: hv_vmbus: registering driver hv_pci Oct 2 20:35:53.593416 kernel: hv_pci f6855a75-8001-4915-abd5-c3ac35c563a6: PCI VMBus probing: Using version 0x10004 Oct 2 20:35:53.609705 kernel: hv_pci f6855a75-8001-4915-abd5-c3ac35c563a6: PCI host bridge to bus 8001:00 Oct 2 20:35:53.609872 kernel: pci_bus 8001:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Oct 2 20:35:53.615752 kernel: pci_bus 8001:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 20:35:53.820053 kernel: pci 8001:00:02.0: [15b3:1018] type 00 class 0x020000 Oct 2 20:35:53.832827 kernel: pci 8001:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:53.852356 kernel: pci 8001:00:02.0: enabling Extended Tags Oct 2 20:35:53.870023 kernel: pci 8001:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 8001:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Oct 2 20:35:53.880962 kernel: pci_bus 8001:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 20:35:53.881113 kernel: pci 8001:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:53.922015 kernel: mlx5_core 8001:00:02.0: firmware version: 16.31.2424 Oct 2 20:35:54.093024 kernel: mlx5_core 8001:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Oct 2 20:35:54.104154 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:35:54.131019 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (527) Oct 2 20:35:54.148808 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:35:54.245892 kernel: hv_netvsc 0022487a-eb87-0022-487a-eb870022487a eth0: VF registering: eth1 Oct 2 20:35:54.246098 kernel: mlx5_core 8001:00:02.0 eth1: joined to eth0 Oct 2 20:35:54.259011 kernel: mlx5_core 8001:00:02.0 enP32769s1: renamed from eth1 Oct 2 20:35:54.309714 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:35:54.320580 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:35:54.337672 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:35:54.347167 systemd[1]: Starting disk-uuid.service... Oct 2 20:35:54.367034 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:55.390351 disk-uuid[602]: The operation has completed successfully. Oct 2 20:35:55.395384 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:55.459617 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:35:55.464130 systemd[1]: Finished disk-uuid.service. Oct 2 20:35:55.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:55.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:55.472307 systemd[1]: Starting verity-setup.service... Oct 2 20:35:55.512022 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 20:35:55.858955 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:35:55.864588 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:35:55.878152 systemd[1]: Finished verity-setup.service. Oct 2 20:35:55.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:55.933010 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:35:55.933136 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:35:55.937105 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:35:55.937830 systemd[1]: Starting ignition-setup.service... Oct 2 20:35:55.944523 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:35:55.987719 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:55.987758 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:55.987768 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:56.073312 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 20:35:56.124571 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:35:56.155456 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 20:35:56.155477 kernel: audit: type=1130 audit(1696278956.129:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.134624 systemd[1]: Starting systemd-networkd.service... Oct 2 20:35:56.168398 kernel: audit: type=1334 audit(1696278956.133:22): prog-id=9 op=LOAD Oct 2 20:35:56.133000 audit: BPF prog-id=9 op=LOAD Oct 2 20:35:56.188304 systemd-networkd[848]: lo: Link UP Oct 2 20:35:56.188315 systemd-networkd[848]: lo: Gained carrier Oct 2 20:35:56.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.188693 systemd-networkd[848]: Enumeration completed Oct 2 20:35:56.222522 kernel: audit: type=1130 audit(1696278956.196:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.191782 systemd[1]: Started systemd-networkd.service. Oct 2 20:35:56.196466 systemd[1]: Reached target network.target. Oct 2 20:35:56.200386 systemd-networkd[848]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:35:56.219722 systemd[1]: Starting iscsiuio.service... Oct 2 20:35:56.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.233200 systemd[1]: Started iscsiuio.service. Oct 2 20:35:56.249285 systemd[1]: Starting iscsid.service... Oct 2 20:35:56.273927 iscsid[853]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:56.273927 iscsid[853]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:35:56.273927 iscsid[853]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:35:56.273927 iscsid[853]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:35:56.273927 iscsid[853]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:56.273927 iscsid[853]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:35:56.411270 kernel: audit: type=1130 audit(1696278956.245:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.411297 kernel: mlx5_core 8001:00:02.0 enP32769s1: Link up Oct 2 20:35:56.411428 kernel: audit: type=1130 audit(1696278956.283:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.411439 kernel: audit: type=1130 audit(1696278956.306:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.411448 kernel: hv_netvsc 0022487a-eb87-0022-487a-eb870022487a eth0: Data path switched to VF: enP32769s1 Oct 2 20:35:56.411530 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:35:56.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.279521 systemd[1]: Finished ignition-setup.service. Oct 2 20:35:56.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.284101 systemd[1]: Started iscsid.service. Oct 2 20:35:56.441387 kernel: audit: type=1130 audit(1696278956.415:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.308225 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:35:56.333428 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:35:56.393850 systemd-networkd[848]: enP32769s1: Link UP Oct 2 20:35:56.393929 systemd-networkd[848]: eth0: Link UP Oct 2 20:35:56.394086 systemd-networkd[848]: eth0: Gained carrier Oct 2 20:35:56.404196 systemd-networkd[848]: enP32769s1: Gained carrier Oct 2 20:35:56.411240 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:35:56.507073 kernel: audit: type=1130 audit(1696278956.485:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.430971 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:35:56.438149 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:35:56.446509 systemd[1]: Reached target remote-fs.target. Oct 2 20:35:56.459390 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:35:56.459806 systemd-networkd[848]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:35:56.482858 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:35:57.734117 systemd-networkd[848]: eth0: Gained IPv6LL Oct 2 20:35:59.056835 ignition[856]: Ignition 2.14.0 Oct 2 20:35:59.056846 ignition[856]: Stage: fetch-offline Oct 2 20:35:59.056899 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:59.056922 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:59.168984 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:59.169150 ignition[856]: parsed url from cmdline: "" Oct 2 20:35:59.169154 ignition[856]: no config URL provided Oct 2 20:35:59.169159 ignition[856]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:59.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.181516 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:35:59.215185 kernel: audit: type=1130 audit(1696278959.189:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.169170 ignition[856]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:59.209612 systemd[1]: Starting ignition-fetch.service... Oct 2 20:35:59.169175 ignition[856]: failed to fetch config: resource requires networking Oct 2 20:35:59.169462 ignition[856]: Ignition finished successfully Oct 2 20:35:59.226292 ignition[874]: Ignition 2.14.0 Oct 2 20:35:59.226298 ignition[874]: Stage: fetch Oct 2 20:35:59.226403 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:59.226424 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:59.229297 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:59.232100 ignition[874]: parsed url from cmdline: "" Oct 2 20:35:59.232112 ignition[874]: no config URL provided Oct 2 20:35:59.232120 ignition[874]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:59.232149 ignition[874]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:59.232179 ignition[874]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 20:35:59.257423 ignition[874]: GET result: OK Oct 2 20:35:59.257517 ignition[874]: config has been read from IMDS userdata Oct 2 20:35:59.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.287319 unknown[874]: fetched base config from "system" Oct 2 20:35:59.321380 kernel: audit: type=1130 audit(1696278959.294:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.257578 ignition[874]: parsing config with SHA512: e09249e2139cd12adf9551ed076c651c4a2321628eed6f457b7657406644f1314cebde71aeb89924b9736b3e24ce167d4b81bbee0d545a4f2124ca14ab374450 Oct 2 20:35:59.287327 unknown[874]: fetched base config from "system" Oct 2 20:35:59.287836 ignition[874]: fetch: fetch complete Oct 2 20:35:59.287332 unknown[874]: fetched user config from "azure" Oct 2 20:35:59.287842 ignition[874]: fetch: fetch passed Oct 2 20:35:59.289703 systemd[1]: Finished ignition-fetch.service. Oct 2 20:35:59.287884 ignition[874]: Ignition finished successfully Oct 2 20:35:59.295515 systemd[1]: Starting ignition-kargs.service... Oct 2 20:35:59.335477 ignition[880]: Ignition 2.14.0 Oct 2 20:35:59.351419 systemd[1]: Finished ignition-kargs.service. Oct 2 20:35:59.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.335483 ignition[880]: Stage: kargs Oct 2 20:35:59.359645 systemd[1]: Starting ignition-disks.service... Oct 2 20:35:59.335635 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:59.335665 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:59.344717 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:59.345943 ignition[880]: kargs: kargs passed Oct 2 20:35:59.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.386263 systemd[1]: Finished ignition-disks.service. Oct 2 20:35:59.345986 ignition[880]: Ignition finished successfully Oct 2 20:35:59.391492 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:35:59.378942 ignition[886]: Ignition 2.14.0 Oct 2 20:35:59.399770 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:35:59.378948 ignition[886]: Stage: disks Oct 2 20:35:59.407892 systemd[1]: Reached target local-fs.target. Oct 2 20:35:59.379071 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:59.415886 systemd[1]: Reached target sysinit.target. Oct 2 20:35:59.379092 ignition[886]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:59.424268 systemd[1]: Reached target basic.target. Oct 2 20:35:59.382226 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:59.432212 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:35:59.385394 ignition[886]: disks: disks passed Oct 2 20:35:59.385455 ignition[886]: Ignition finished successfully Oct 2 20:35:59.531489 systemd-fsck[894]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks Oct 2 20:35:59.545987 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:35:59.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:59.551444 systemd[1]: Mounting sysroot.mount... Oct 2 20:35:59.578040 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:35:59.578658 systemd[1]: Mounted sysroot.mount. Oct 2 20:35:59.585983 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:35:59.625562 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:35:59.629950 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:35:59.634340 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:35:59.634381 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:35:59.643525 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:35:59.684493 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:35:59.689455 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:35:59.714273 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (905) Oct 2 20:35:59.720740 initrd-setup-root[910]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:35:59.737290 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:59.737312 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:59.737322 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:59.737265 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:35:59.763131 initrd-setup-root[936]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:35:59.775081 initrd-setup-root[944]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:35:59.787341 initrd-setup-root[952]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:36:00.242873 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:36:00.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:00.248357 systemd[1]: Starting ignition-mount.service... Oct 2 20:36:00.256477 systemd[1]: Starting sysroot-boot.service... Oct 2 20:36:00.271713 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:36:00.271811 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:36:00.300752 systemd[1]: Finished sysroot-boot.service. Oct 2 20:36:00.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:00.309718 ignition[974]: INFO : Ignition 2.14.0 Oct 2 20:36:00.309718 ignition[974]: INFO : Stage: mount Oct 2 20:36:00.317437 ignition[974]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:36:00.317437 ignition[974]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:36:00.317437 ignition[974]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:36:00.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:00.346466 ignition[974]: INFO : mount: mount passed Oct 2 20:36:00.346466 ignition[974]: INFO : Ignition finished successfully Oct 2 20:36:00.323730 systemd[1]: Finished ignition-mount.service. Oct 2 20:36:00.781442 coreos-metadata[904]: Oct 02 20:36:00.781 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:36:00.791455 coreos-metadata[904]: Oct 02 20:36:00.791 INFO Fetch successful Oct 2 20:36:00.824920 coreos-metadata[904]: Oct 02 20:36:00.824 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:36:00.840036 coreos-metadata[904]: Oct 02 20:36:00.840 INFO Fetch successful Oct 2 20:36:00.845074 coreos-metadata[904]: Oct 02 20:36:00.844 INFO wrote hostname ci-3510.3.0-a-855b1f86a1 to /sysroot/etc/hostname Oct 2 20:36:00.854050 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:36:00.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:00.860048 systemd[1]: Starting ignition-files.service... Oct 2 20:36:00.876773 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:36:00.896018 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (983) Oct 2 20:36:00.907662 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:36:00.907677 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:36:00.907686 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:36:00.918623 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:36:00.938424 ignition[1002]: INFO : Ignition 2.14.0 Oct 2 20:36:00.942554 ignition[1002]: INFO : Stage: files Oct 2 20:36:00.948070 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:36:00.948070 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:36:00.972035 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:36:00.978660 ignition[1002]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:36:00.994727 ignition[1002]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:36:00.994727 ignition[1002]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:36:01.069855 ignition[1002]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:36:01.077381 ignition[1002]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:36:01.091148 unknown[1002]: wrote ssh authorized keys file for user: core Oct 2 20:36:01.097312 ignition[1002]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:36:01.105727 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:36:01.116195 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Oct 2 20:36:01.237572 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:36:01.460858 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Oct 2 20:36:01.477263 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 20:36:01.477263 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Oct 2 20:36:01.477263 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Oct 2 20:36:01.694059 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:36:01.825516 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Oct 2 20:36:01.825516 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Oct 2 20:36:01.851264 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:36:01.851264 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Oct 2 20:36:01.934895 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:36:02.732508 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Oct 2 20:36:02.749194 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:36:02.749194 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:02.749194 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Oct 2 20:36:02.790152 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:36:03.561491 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Oct 2 20:36:03.577231 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:03.577231 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:03.577231 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Oct 2 20:36:03.616485 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 20:36:03.930472 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Oct 2 20:36:03.956512 kernel: mlx5_core 8001:00:02.0: poll_health:739:(pid 275): device's health compromised - reached miss count Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:03.958421 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:04.088305 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1002) Oct 2 20:36:04.088329 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 20:36:04.088339 kernel: audit: type=1130 audit(1696278964.032:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830758864" Oct 2 20:36:04.088391 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830758864": device or resource busy Oct 2 20:36:04.088391 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2830758864", trying btrfs: device or resource busy Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830758864" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830758864" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2830758864" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2830758864" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2114113005" Oct 2 20:36:04.088391 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2114113005": device or resource busy Oct 2 20:36:04.088391 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2114113005", trying btrfs: device or resource busy Oct 2 20:36:04.088391 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2114113005" Oct 2 20:36:04.332651 kernel: audit: type=1130 audit(1696278964.108:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.332685 kernel: audit: type=1131 audit(1696278964.122:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.332695 kernel: audit: type=1130 audit(1696278964.188:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.332705 kernel: audit: type=1130 audit(1696278964.293:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.988179 systemd[1]: mnt-oem2830758864.mount: Deactivated successfully. Oct 2 20:36:04.341854 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2114113005" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2114113005" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2114113005" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(13): [started] processing unit "waagent.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(13): [finished] processing unit "waagent.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(14): [started] processing unit "nvidia.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(14): [finished] processing unit "nvidia.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:04.341854 ignition[1002]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:04.614251 kernel: audit: type=1131 audit(1696278964.321:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.614281 kernel: audit: type=1130 audit(1696278964.427:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.614291 kernel: audit: type=1131 audit(1696278964.514:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.028250 systemd[1]: Finished ignition-files.service. Oct 2 20:36:04.622265 ignition[1002]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: op(1b): [started] setting preset to enabled for "waagent.service" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: op(1b): [finished] setting preset to enabled for "waagent.service" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: op(1c): [started] setting preset to enabled for "nvidia.service" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: op(1c): [finished] setting preset to enabled for "nvidia.service" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:04.622265 ignition[1002]: INFO : files: files passed Oct 2 20:36:04.622265 ignition[1002]: INFO : Ignition finished successfully Oct 2 20:36:04.758351 kernel: audit: type=1131 audit(1696278964.670:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.758382 kernel: audit: type=1131 audit(1696278964.711:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.758490 initrd-setup-root-after-ignition[1027]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:36:04.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.036117 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:36:04.793690 iscsid[853]: iscsid shutting down. Oct 2 20:36:04.066289 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:36:04.076408 systemd[1]: Starting ignition-quench.service... Oct 2 20:36:04.094013 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:36:04.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.094127 systemd[1]: Finished ignition-quench.service. Oct 2 20:36:04.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.173688 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:36:04.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.215328 systemd[1]: Reached target ignition-complete.target. Oct 2 20:36:04.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.853516 ignition[1040]: INFO : Ignition 2.14.0 Oct 2 20:36:04.853516 ignition[1040]: INFO : Stage: umount Oct 2 20:36:04.853516 ignition[1040]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:36:04.853516 ignition[1040]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:36:04.853516 ignition[1040]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:36:04.853516 ignition[1040]: INFO : umount: umount passed Oct 2 20:36:04.853516 ignition[1040]: INFO : Ignition finished successfully Oct 2 20:36:04.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.237900 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:36:04.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.279333 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:36:04.279462 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:36:04.322733 systemd[1]: Reached target initrd-fs.target. Oct 2 20:36:04.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.336953 systemd[1]: Reached target initrd.target. Oct 2 20:36:04.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.345843 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:36:04.370420 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:36:04.417373 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:36:04.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.428774 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:36:04.463795 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:36:04.472118 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:36:04.487612 systemd[1]: Stopped target timers.target. Oct 2 20:36:05.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.503036 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:36:05.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.503107 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:36:05.042000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:36:04.514432 systemd[1]: Stopped target initrd.target. Oct 2 20:36:04.541603 systemd[1]: Stopped target basic.target. Oct 2 20:36:04.556124 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:36:05.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.571028 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:36:05.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.582381 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:36:05.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.594796 systemd[1]: Stopped target remote-fs.target. Oct 2 20:36:04.606812 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:36:05.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.618421 systemd[1]: Stopped target sysinit.target. Oct 2 20:36:04.626008 systemd[1]: Stopped target local-fs.target. Oct 2 20:36:04.637806 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:36:04.649203 systemd[1]: Stopped target swap.target. Oct 2 20:36:05.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.660034 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:36:05.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.660098 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:36:05.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.670958 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:36:04.698422 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:36:04.698474 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:36:04.712534 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:36:05.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.712581 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:36:04.743925 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:36:05.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.743973 systemd[1]: Stopped ignition-files.service. Oct 2 20:36:05.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.752858 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:36:05.215740 kernel: hv_netvsc 0022487a-eb87-0022-487a-eb870022487a eth0: Data path switched from VF: enP32769s1 Oct 2 20:36:05.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:05.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.752906 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:36:04.764138 systemd[1]: Stopping ignition-mount.service... Oct 2 20:36:04.779709 systemd[1]: Stopping iscsid.service... Oct 2 20:36:04.790038 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:36:04.804038 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:36:04.804120 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:36:04.818762 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:36:04.818825 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:36:04.830751 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:36:04.830848 systemd[1]: Stopped iscsid.service. Oct 2 20:36:04.837845 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:36:04.837922 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:36:04.850451 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:36:04.850991 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:36:04.851088 systemd[1]: Stopped ignition-mount.service. Oct 2 20:36:04.857867 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:36:04.857919 systemd[1]: Stopped ignition-disks.service. Oct 2 20:36:04.865873 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:36:04.865917 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:36:04.870110 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 20:36:04.870144 systemd[1]: Stopped ignition-fetch.service. Oct 2 20:36:04.877677 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:36:04.877718 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:36:05.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.888690 systemd[1]: Stopped target paths.target. Oct 2 20:36:04.905142 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:36:04.912023 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:36:04.916710 systemd[1]: Stopped target slices.target. Oct 2 20:36:04.921193 systemd[1]: Stopped target sockets.target. Oct 2 20:36:04.925186 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:36:04.925236 systemd[1]: Closed iscsid.socket. Oct 2 20:36:04.932273 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:36:04.932313 systemd[1]: Stopped ignition-setup.service. Oct 2 20:36:05.379712 systemd-journald[275]: Received SIGTERM from PID 1 (n/a). Oct 2 20:36:04.940976 systemd[1]: Stopping iscsiuio.service... Oct 2 20:36:04.954925 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:36:04.955034 systemd[1]: Stopped iscsiuio.service. Oct 2 20:36:04.963428 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:36:04.963504 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:36:04.971486 systemd[1]: Stopped target network.target. Oct 2 20:36:04.978797 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:36:04.978826 systemd[1]: Closed iscsiuio.socket. Oct 2 20:36:04.988483 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:36:04.988522 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:36:04.996612 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:05.004725 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:36:05.012032 systemd-networkd[848]: eth0: DHCPv6 lease lost Oct 2 20:36:05.017053 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:05.017156 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:05.026442 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:36:05.026527 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:36:05.034043 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:36:05.034077 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:36:05.046140 systemd[1]: Stopping network-cleanup.service... Oct 2 20:36:05.054843 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:36:05.054910 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:36:05.062632 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:36:05.062677 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:36:05.074529 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:36:05.074565 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:36:05.079102 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:36:05.088590 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:36:05.089163 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:36:05.089308 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:36:05.380000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:36:05.100139 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:36:05.100182 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:36:05.109565 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:36:05.109606 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:36:05.117466 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:36:05.117513 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:36:05.125616 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:36:05.125660 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:36:05.133144 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:36:05.133184 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:36:05.145941 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:36:05.160600 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 20:36:05.160662 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 20:36:05.174977 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:36:05.175305 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:36:05.184187 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:36:05.184221 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:36:05.194145 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 20:36:05.194580 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:36:05.194659 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:36:05.309532 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:36:05.309643 systemd[1]: Stopped network-cleanup.service. Oct 2 20:36:05.319275 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:36:05.328598 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:36:05.349445 systemd[1]: Switching root. Oct 2 20:36:05.381135 systemd-journald[275]: Journal stopped Oct 2 20:36:16.298177 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:36:16.298201 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:36:16.298212 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:36:16.298223 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:36:16.298231 kernel: SELinux: policy capability open_perms=1 Oct 2 20:36:16.298239 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:36:16.298248 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:36:16.298255 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:36:16.298263 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:36:16.298271 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:36:16.298280 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:36:16.298290 systemd[1]: Successfully loaded SELinux policy in 228.783ms. Oct 2 20:36:16.298300 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.316ms. Oct 2 20:36:16.298310 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:36:16.298321 systemd[1]: Detected virtualization microsoft. Oct 2 20:36:16.298330 systemd[1]: Detected architecture arm64. Oct 2 20:36:16.298339 systemd[1]: Detected first boot. Oct 2 20:36:16.298348 systemd[1]: Hostname set to . Oct 2 20:36:16.298357 systemd[1]: Initializing machine ID from random generator. Oct 2 20:36:16.298365 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:36:16.298377 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:36:16.298386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:36:16.298398 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:36:16.298407 kernel: kauditd_printk_skb: 41 callbacks suppressed Oct 2 20:36:16.298415 kernel: audit: type=1334 audit(1696278975.655:89): prog-id=12 op=LOAD Oct 2 20:36:16.298424 kernel: audit: type=1334 audit(1696278975.655:90): prog-id=3 op=UNLOAD Oct 2 20:36:16.298432 kernel: audit: type=1334 audit(1696278975.655:91): prog-id=13 op=LOAD Oct 2 20:36:16.298441 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:36:16.298449 kernel: audit: type=1334 audit(1696278975.655:92): prog-id=14 op=LOAD Oct 2 20:36:16.298459 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:36:16.298469 kernel: audit: type=1334 audit(1696278975.655:93): prog-id=4 op=UNLOAD Oct 2 20:36:16.298477 kernel: audit: type=1334 audit(1696278975.655:94): prog-id=5 op=UNLOAD Oct 2 20:36:16.298485 kernel: audit: type=1334 audit(1696278975.660:95): prog-id=15 op=LOAD Oct 2 20:36:16.298493 kernel: audit: type=1334 audit(1696278975.660:96): prog-id=12 op=UNLOAD Oct 2 20:36:16.298502 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:36:16.298511 kernel: audit: type=1334 audit(1696278975.665:97): prog-id=16 op=LOAD Oct 2 20:36:16.298520 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:36:16.298529 kernel: audit: type=1334 audit(1696278975.671:98): prog-id=17 op=LOAD Oct 2 20:36:16.298537 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:36:16.298546 systemd[1]: Created slice system-getty.slice. Oct 2 20:36:16.298557 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:36:16.298568 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:36:16.298577 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:36:16.298587 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:36:16.298596 systemd[1]: Created slice user.slice. Oct 2 20:36:16.298606 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:36:16.298615 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:36:16.298624 systemd[1]: Set up automount boot.automount. Oct 2 20:36:16.298633 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:36:16.298642 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:36:16.298651 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:36:16.298660 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:36:16.298670 systemd[1]: Reached target integritysetup.target. Oct 2 20:36:16.298679 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:36:16.298689 systemd[1]: Reached target remote-fs.target. Oct 2 20:36:16.298698 systemd[1]: Reached target slices.target. Oct 2 20:36:16.298707 systemd[1]: Reached target swap.target. Oct 2 20:36:16.298716 systemd[1]: Reached target torcx.target. Oct 2 20:36:16.298725 systemd[1]: Reached target veritysetup.target. Oct 2 20:36:16.298734 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:36:16.298743 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:36:16.298753 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:36:16.298768 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:36:16.298778 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:36:16.298788 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:36:16.298797 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:36:16.298807 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:36:16.298816 systemd[1]: Mounting media.mount... Oct 2 20:36:16.298826 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:36:16.298835 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:36:16.298844 systemd[1]: Mounting tmp.mount... Oct 2 20:36:16.298853 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:36:16.298863 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:36:16.298872 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:36:16.298881 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:36:16.298892 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:36:16.298901 systemd[1]: Starting modprobe@drm.service... Oct 2 20:36:16.298910 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:36:16.298919 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:36:16.298929 systemd[1]: Starting modprobe@loop.service... Oct 2 20:36:16.298938 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:36:16.298948 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:36:16.298957 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:36:16.298967 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:36:16.298978 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:36:16.298987 systemd[1]: Stopped systemd-journald.service. Oct 2 20:36:16.299007 kernel: fuse: init (API version 7.34) Oct 2 20:36:16.299017 systemd[1]: systemd-journald.service: Consumed 2.844s CPU time. Oct 2 20:36:16.299026 kernel: loop: module loaded Oct 2 20:36:16.299035 systemd[1]: Starting systemd-journald.service... Oct 2 20:36:16.299044 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:36:16.299054 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:36:16.299063 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:36:16.299073 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:36:16.299083 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:36:16.299092 systemd[1]: Stopped verity-setup.service. Oct 2 20:36:16.299101 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:36:16.299110 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:36:16.299119 systemd[1]: Mounted media.mount. Oct 2 20:36:16.299132 systemd-journald[1168]: Journal started Oct 2 20:36:16.299219 systemd-journald[1168]: Runtime Journal (/run/log/journal/cda0cf75157b453c9b6d50f0546e0ba1) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:36:07.661000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:36:08.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:08.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:08.312000 audit: BPF prog-id=10 op=LOAD Oct 2 20:36:08.312000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:36:08.312000 audit: BPF prog-id=11 op=LOAD Oct 2 20:36:08.312000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:36:15.655000 audit: BPF prog-id=12 op=LOAD Oct 2 20:36:15.655000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:36:15.655000 audit: BPF prog-id=13 op=LOAD Oct 2 20:36:15.655000 audit: BPF prog-id=14 op=LOAD Oct 2 20:36:15.655000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:36:15.655000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:36:15.660000 audit: BPF prog-id=15 op=LOAD Oct 2 20:36:15.660000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:36:15.665000 audit: BPF prog-id=16 op=LOAD Oct 2 20:36:15.671000 audit: BPF prog-id=17 op=LOAD Oct 2 20:36:15.671000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:36:15.671000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:36:15.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.702000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:36:15.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.189000 audit: BPF prog-id=18 op=LOAD Oct 2 20:36:16.189000 audit: BPF prog-id=19 op=LOAD Oct 2 20:36:16.189000 audit: BPF prog-id=20 op=LOAD Oct 2 20:36:16.189000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:36:16.189000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:36:16.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.295000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:36:16.295000 audit[1168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffbf56540 a2=4000 a3=1 items=0 ppid=1 pid=1168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:16.295000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:36:09.539593 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:36:15.653715 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:36:09.584864 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:15.673140 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:36:09.584890 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:15.673508 systemd[1]: systemd-journald.service: Consumed 2.844s CPU time. Oct 2 20:36:09.584927 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:36:09.584937 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:36:09.584973 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:36:09.584986 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:36:09.585200 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:36:09.585232 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:09.585243 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:09.585566 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:36:09.585604 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:36:09.585621 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:36:09.585634 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:36:09.585650 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:36:09.585663 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:36:14.818201 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.818455 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.818573 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.818721 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.818771 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:36:14.818822 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2023-10-02T20:36:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:36:16.310076 systemd[1]: Started systemd-journald.service. Oct 2 20:36:16.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.310794 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:36:16.314970 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:36:16.319423 systemd[1]: Mounted tmp.mount. Oct 2 20:36:16.323369 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:36:16.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.328312 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:36:16.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.333867 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:36:16.333989 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:36:16.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.339293 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:36:16.339409 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:36:16.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.343892 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:36:16.344110 systemd[1]: Finished modprobe@drm.service. Oct 2 20:36:16.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.348490 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:36:16.348609 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:36:16.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.354447 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:36:16.354559 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:36:16.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.359153 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:36:16.359269 systemd[1]: Finished modprobe@loop.service. Oct 2 20:36:16.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.364099 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:36:16.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.369691 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:36:16.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.374691 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:36:16.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.379822 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:36:16.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.384983 systemd[1]: Reached target network-pre.target. Oct 2 20:36:16.390545 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:36:16.396779 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:36:16.400674 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:36:16.456457 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:36:16.462629 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:36:16.467870 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:36:16.469482 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:36:16.473576 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:36:16.474663 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:36:16.479546 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:36:16.484414 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:36:16.491236 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:36:16.496460 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:36:16.503316 udevadm[1194]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 20:36:16.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.530504 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:36:16.535441 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:36:16.543206 systemd-journald[1168]: Time spent on flushing to /var/log/journal/cda0cf75157b453c9b6d50f0546e0ba1 is 14.378ms for 1102 entries. Oct 2 20:36:16.543206 systemd-journald[1168]: System Journal (/var/log/journal/cda0cf75157b453c9b6d50f0546e0ba1) is 8.0M, max 2.6G, 2.6G free. Oct 2 20:36:16.601532 systemd-journald[1168]: Received client request to flush runtime journal. Oct 2 20:36:16.602668 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:36:16.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.608097 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:36:16.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.983673 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:36:16.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.989851 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:36:17.306077 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:36:17.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.679093 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:36:17.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.684000 audit: BPF prog-id=21 op=LOAD Oct 2 20:36:17.684000 audit: BPF prog-id=22 op=LOAD Oct 2 20:36:17.684000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:36:17.684000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:36:17.684749 systemd[1]: Starting systemd-udevd.service... Oct 2 20:36:17.704260 systemd-udevd[1199]: Using default interface naming scheme 'v252'. Oct 2 20:36:17.887910 systemd[1]: Started systemd-udevd.service. Oct 2 20:36:17.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:17.897000 audit: BPF prog-id=23 op=LOAD Oct 2 20:36:17.897878 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:17.944208 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 20:36:17.971161 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:36:17.970000 audit: BPF prog-id=24 op=LOAD Oct 2 20:36:17.970000 audit: BPF prog-id=25 op=LOAD Oct 2 20:36:17.970000 audit: BPF prog-id=26 op=LOAD Oct 2 20:36:18.032024 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:36:18.040018 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 20:36:18.045036 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 20:36:18.056144 systemd[1]: Started systemd-userdbd.service. Oct 2 20:36:18.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.052000 audit[1209]: AVC avc: denied { confidentiality } for pid=1209 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:36:18.062083 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 20:36:18.072211 kernel: hv_vmbus: registering driver hv_balloon Oct 2 20:36:18.072280 kernel: Console: switching to colour dummy device 80x25 Oct 2 20:36:18.072344 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 20:36:18.080102 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:36:18.080179 kernel: hv_balloon: Memory hot add disabled on ARM64 Oct 2 20:36:18.052000 audit[1209]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaccb95cf0 a1=aa2c a2=ffffa60624b0 a3=aaaaccaf3010 items=10 ppid=1199 pid=1209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:18.052000 audit: CWD cwd="/" Oct 2 20:36:18.052000 audit: PATH item=0 name=(null) inode=10539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=1 name=(null) inode=10540 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=2 name=(null) inode=10539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=3 name=(null) inode=10541 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=4 name=(null) inode=10539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=5 name=(null) inode=10542 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=6 name=(null) inode=10539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=7 name=(null) inode=10543 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=8 name=(null) inode=10539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PATH item=9 name=(null) inode=10544 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.052000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:36:18.123621 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 20:36:18.123704 kernel: hv_vmbus: registering driver hv_utils Oct 2 20:36:18.137032 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 20:36:18.454752 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 20:36:18.454770 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 20:36:18.638501 systemd-networkd[1219]: lo: Link UP Oct 2 20:36:18.638514 systemd-networkd[1219]: lo: Gained carrier Oct 2 20:36:18.638917 systemd-networkd[1219]: Enumeration completed Oct 2 20:36:18.639013 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:18.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.644575 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:18.674272 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:18.679611 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1215) Oct 2 20:36:18.709946 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:36:18.715438 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:36:18.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.721907 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:36:18.730598 kernel: mlx5_core 8001:00:02.0 enP32769s1: Link up Oct 2 20:36:18.773595 kernel: hv_netvsc 0022487a-eb87-0022-487a-eb870022487a eth0: Data path switched to VF: enP32769s1 Oct 2 20:36:18.775879 systemd-networkd[1219]: enP32769s1: Link UP Oct 2 20:36:18.776266 systemd-networkd[1219]: eth0: Link UP Oct 2 20:36:18.776324 systemd-networkd[1219]: eth0: Gained carrier Oct 2 20:36:18.788098 systemd-networkd[1219]: enP32769s1: Gained carrier Oct 2 20:36:18.799719 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:19.000944 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.042617 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:36:19.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.048321 systemd[1]: Reached target cryptsetup.target. Oct 2 20:36:19.054253 systemd[1]: Starting lvm2-activation.service... Oct 2 20:36:19.061170 lvm[1279]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.084730 systemd[1]: Finished lvm2-activation.service. Oct 2 20:36:19.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.089415 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:36:19.094185 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:36:19.094213 systemd[1]: Reached target local-fs.target. Oct 2 20:36:19.098760 systemd[1]: Reached target machines.target. Oct 2 20:36:19.104668 systemd[1]: Starting ldconfig.service... Oct 2 20:36:19.108486 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.108552 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:19.110178 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:36:19.115782 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:36:19.122533 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:36:19.127742 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.127813 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.129178 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:36:19.156520 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1281 (bootctl) Oct 2 20:36:19.159383 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:36:19.168472 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:36:19.445327 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:36:19.694071 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:36:19.697786 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:36:19.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.875744 systemd-networkd[1219]: eth0: Gained IPv6LL Oct 2 20:36:19.882968 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:19.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.292676 systemd-fsck[1289]: fsck.fat 4.2 (2021-01-31) Oct 2 20:36:20.292676 systemd-fsck[1289]: /dev/sda1: 236 files, 113463/258078 clusters Oct 2 20:36:20.295040 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:36:20.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.305507 systemd[1]: Mounting boot.mount... Oct 2 20:36:20.530736 systemd[1]: Mounted boot.mount. Oct 2 20:36:20.540737 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:36:20.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.599604 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:36:20.600163 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:36:20.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.048295 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:36:21.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.057134 kernel: kauditd_printk_skb: 77 callbacks suppressed Oct 2 20:36:21.057193 kernel: audit: type=1130 audit(1696278981.051:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.058384 systemd[1]: Starting audit-rules.service... Oct 2 20:36:21.079126 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:36:21.086987 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:36:21.091000 audit: BPF prog-id=27 op=LOAD Oct 2 20:36:21.093902 systemd[1]: Starting systemd-resolved.service... Oct 2 20:36:21.102312 kernel: audit: type=1334 audit(1696278981.091:162): prog-id=27 op=LOAD Oct 2 20:36:21.102000 audit: BPF prog-id=28 op=LOAD Oct 2 20:36:21.109316 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:36:21.114024 kernel: audit: type=1334 audit(1696278981.102:163): prog-id=28 op=LOAD Oct 2 20:36:21.116223 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:36:21.128528 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:36:21.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.149977 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:36:21.150628 kernel: audit: type=1130 audit(1696278981.131:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.169000 audit[1304]: SYSTEM_BOOT pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.192961 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:36:21.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.213901 kernel: audit: type=1127 audit(1696278981.169:165): pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.213971 kernel: audit: type=1130 audit(1696278981.195:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.237539 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:36:21.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.262603 kernel: audit: type=1130 audit(1696278981.242:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.304230 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:36:21.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.308926 systemd[1]: Reached target time-set.target. Oct 2 20:36:21.330849 kernel: audit: type=1130 audit(1696278981.307:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.358374 systemd-resolved[1299]: Positive Trust Anchors: Oct 2 20:36:21.358396 systemd-resolved[1299]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:36:21.358423 systemd-resolved[1299]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:36:21.417141 systemd-resolved[1299]: Using system hostname 'ci-3510.3.0-a-855b1f86a1'. Oct 2 20:36:21.419078 systemd[1]: Started systemd-resolved.service. Oct 2 20:36:21.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.423673 systemd[1]: Reached target network.target. Oct 2 20:36:21.445121 kernel: audit: type=1130 audit(1696278981.421:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.445418 systemd[1]: Reached target network-online.target. Oct 2 20:36:21.449995 systemd[1]: Reached target nss-lookup.target. Oct 2 20:36:21.516000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:36:21.516000 audit[1316]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe38cb5d0 a2=420 a3=0 items=0 ppid=1295 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:21.516000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:36:21.530603 kernel: audit: type=1305 audit(1696278981.516:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:36:21.551667 augenrules[1316]: No rules Oct 2 20:36:21.552608 systemd[1]: Finished audit-rules.service. Oct 2 20:36:21.572909 systemd-timesyncd[1300]: Contacted time server 44.190.5.123:123 (0.flatcar.pool.ntp.org). Oct 2 20:36:21.572975 systemd-timesyncd[1300]: Initial clock synchronization to Mon 2023-10-02 20:36:21.572545 UTC. Oct 2 20:36:27.727554 ldconfig[1280]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:36:27.739699 systemd[1]: Finished ldconfig.service. Oct 2 20:36:27.745551 systemd[1]: Starting systemd-update-done.service... Oct 2 20:36:27.777233 systemd[1]: Finished systemd-update-done.service. Oct 2 20:36:27.781869 systemd[1]: Reached target sysinit.target. Oct 2 20:36:27.786015 systemd[1]: Started motdgen.path. Oct 2 20:36:27.789598 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:36:27.795412 systemd[1]: Started logrotate.timer. Oct 2 20:36:27.799335 systemd[1]: Started mdadm.timer. Oct 2 20:36:27.802891 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:36:27.807519 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:36:27.807546 systemd[1]: Reached target paths.target. Oct 2 20:36:27.811472 systemd[1]: Reached target timers.target. Oct 2 20:36:27.816231 systemd[1]: Listening on dbus.socket. Oct 2 20:36:27.820967 systemd[1]: Starting docker.socket... Oct 2 20:36:27.827678 systemd[1]: Listening on sshd.socket. Oct 2 20:36:27.831748 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.832148 systemd[1]: Listening on docker.socket. Oct 2 20:36:27.836047 systemd[1]: Reached target sockets.target. Oct 2 20:36:27.840064 systemd[1]: Reached target basic.target. Oct 2 20:36:27.844203 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.844231 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.845158 systemd[1]: Starting containerd.service... Oct 2 20:36:27.849774 systemd[1]: Starting dbus.service... Oct 2 20:36:27.853848 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:36:27.858848 systemd[1]: Starting extend-filesystems.service... Oct 2 20:36:27.866544 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:36:27.867499 systemd[1]: Starting motdgen.service... Oct 2 20:36:27.871761 systemd[1]: Started nvidia.service. Oct 2 20:36:27.876449 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:36:27.881468 systemd[1]: Starting prepare-critools.service... Oct 2 20:36:27.886534 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:36:27.892621 systemd[1]: Starting sshd-keygen.service... Oct 2 20:36:27.898781 systemd[1]: Starting systemd-logind.service... Oct 2 20:36:27.904958 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.905012 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 20:36:27.905390 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:36:27.907816 systemd[1]: Starting update-engine.service... Oct 2 20:36:27.914343 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:36:27.936394 jq[1326]: false Oct 2 20:36:27.936642 jq[1344]: true Oct 2 20:36:27.928181 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:36:27.928383 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:36:27.943103 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:36:27.943268 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:36:27.953870 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:36:27.954030 systemd[1]: Finished motdgen.service. Oct 2 20:36:27.963517 extend-filesystems[1327]: Found sda Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda1 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda2 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda3 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found usr Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda4 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda6 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda7 Oct 2 20:36:27.970071 extend-filesystems[1327]: Found sda9 Oct 2 20:36:27.970071 extend-filesystems[1327]: Checking size of /dev/sda9 Oct 2 20:36:28.017003 jq[1349]: true Oct 2 20:36:28.001764 systemd-logind[1339]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 2 20:36:28.007764 systemd-logind[1339]: New seat seat0. Oct 2 20:36:28.061084 extend-filesystems[1327]: Old size kept for /dev/sda9 Oct 2 20:36:28.061084 extend-filesystems[1327]: Found sr0 Oct 2 20:36:28.089996 tar[1348]: crictl Oct 2 20:36:28.090201 tar[1347]: ./ Oct 2 20:36:28.090201 tar[1347]: ./macvlan Oct 2 20:36:28.065909 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:36:28.066098 systemd[1]: Finished extend-filesystems.service. Oct 2 20:36:28.099598 env[1350]: time="2023-10-02T20:36:28.097069045Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:36:28.157568 bash[1394]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:36:28.158760 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:36:28.164943 env[1350]: time="2023-10-02T20:36:28.160214673Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:36:28.164943 env[1350]: time="2023-10-02T20:36:28.160364631Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.166861 env[1350]: time="2023-10-02T20:36:28.166815805Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.166861 env[1350]: time="2023-10-02T20:36:28.166856685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.168408 env[1350]: time="2023-10-02T20:36:28.168373589Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.168408 env[1350]: time="2023-10-02T20:36:28.168406069Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.168497 env[1350]: time="2023-10-02T20:36:28.168423188Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:36:28.168497 env[1350]: time="2023-10-02T20:36:28.168438668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.168540 env[1350]: time="2023-10-02T20:36:28.168524707Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.169544 env[1350]: time="2023-10-02T20:36:28.169517097Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:28.169702 env[1350]: time="2023-10-02T20:36:28.169675495Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:28.169702 env[1350]: time="2023-10-02T20:36:28.169698455Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:36:28.169782 env[1350]: time="2023-10-02T20:36:28.169761295Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:36:28.169782 env[1350]: time="2023-10-02T20:36:28.169779014Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:36:28.174414 tar[1347]: ./static Oct 2 20:36:28.183448 env[1350]: time="2023-10-02T20:36:28.183412194Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:36:28.183540 env[1350]: time="2023-10-02T20:36:28.183451633Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:36:28.183540 env[1350]: time="2023-10-02T20:36:28.183467953Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:36:28.183540 env[1350]: time="2023-10-02T20:36:28.183506193Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.183540 env[1350]: time="2023-10-02T20:36:28.183521433Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.183540 env[1350]: time="2023-10-02T20:36:28.183534392Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.183871 env[1350]: time="2023-10-02T20:36:28.183547832Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184225745Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184254345Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184269625Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184282625Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184294625Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184409223Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184477583Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184775100Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184812459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184827139Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184900418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184914578Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184927058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.185493 env[1350]: time="2023-10-02T20:36:28.184939898Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185115776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185129496Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185142256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185153776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185168336Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185284774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185303414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185315254Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185352654Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185367773Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185378493Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185397413Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:36:28.186028 env[1350]: time="2023-10-02T20:36:28.185432613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:36:28.186311 env[1350]: time="2023-10-02T20:36:28.185664010Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:36:28.186311 env[1350]: time="2023-10-02T20:36:28.185718410Z" level=info msg="Connect containerd service" Oct 2 20:36:28.186311 env[1350]: time="2023-10-02T20:36:28.185767849Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:36:28.201207 env[1350]: time="2023-10-02T20:36:28.187007877Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:36:28.201207 env[1350]: time="2023-10-02T20:36:28.190672279Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:36:28.201207 env[1350]: time="2023-10-02T20:36:28.190716398Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:36:28.201207 env[1350]: time="2023-10-02T20:36:28.190761878Z" level=info msg="containerd successfully booted in 0.094663s" Oct 2 20:36:28.190822 systemd[1]: Started containerd.service. Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.206794632Z" level=info msg="Start subscribing containerd event" Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.206889591Z" level=info msg="Start recovering state" Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.206967871Z" level=info msg="Start event monitor" Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.207030310Z" level=info msg="Start snapshots syncer" Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.207042670Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:36:28.209594 env[1350]: time="2023-10-02T20:36:28.207055550Z" level=info msg="Start streaming server" Oct 2 20:36:28.262316 tar[1347]: ./vlan Oct 2 20:36:28.267879 dbus-daemon[1325]: [system] SELinux support is enabled Oct 2 20:36:28.268029 systemd[1]: Started dbus.service. Oct 2 20:36:28.273417 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:36:28.273439 systemd[1]: Reached target system-config.target. Oct 2 20:36:28.280663 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:36:28.280683 systemd[1]: Reached target user-config.target. Oct 2 20:36:28.287311 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 20:36:28.287659 systemd[1]: Started systemd-logind.service. Oct 2 20:36:28.364017 tar[1347]: ./portmap Oct 2 20:36:28.420710 tar[1347]: ./host-local Oct 2 20:36:28.468114 tar[1347]: ./vrf Oct 2 20:36:28.519042 tar[1347]: ./bridge Oct 2 20:36:28.575723 tar[1347]: ./tuning Oct 2 20:36:28.604945 update_engine[1341]: I1002 20:36:28.588924 1341 main.cc:92] Flatcar Update Engine starting Oct 2 20:36:28.623643 tar[1347]: ./firewall Oct 2 20:36:28.636799 systemd[1]: Finished prepare-critools.service. Oct 2 20:36:28.654881 systemd[1]: Started update-engine.service. Oct 2 20:36:28.660625 update_engine[1341]: I1002 20:36:28.655020 1341 update_check_scheduler.cc:74] Next update check in 10m58s Oct 2 20:36:28.668616 systemd[1]: Started locksmithd.service. Oct 2 20:36:28.681160 tar[1347]: ./host-device Oct 2 20:36:28.709498 tar[1347]: ./sbr Oct 2 20:36:28.733165 tar[1347]: ./loopback Oct 2 20:36:28.756148 tar[1347]: ./dhcp Oct 2 20:36:28.820438 tar[1347]: ./ptp Oct 2 20:36:28.848430 tar[1347]: ./ipvlan Oct 2 20:36:28.876170 tar[1347]: ./bandwidth Oct 2 20:36:28.956978 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:36:30.084189 locksmithd[1432]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:36:31.489689 sshd_keygen[1345]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:36:31.521171 systemd[1]: Finished sshd-keygen.service. Oct 2 20:36:31.527141 systemd[1]: Starting issuegen.service... Oct 2 20:36:31.534010 systemd[1]: Started waagent.service. Oct 2 20:36:31.538475 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:36:31.538637 systemd[1]: Finished issuegen.service. Oct 2 20:36:31.543557 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:36:31.590747 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:36:31.601729 systemd[1]: Started getty@tty1.service. Oct 2 20:36:31.606952 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 20:36:31.611507 systemd[1]: Reached target getty.target. Oct 2 20:36:31.616780 systemd[1]: Reached target multi-user.target. Oct 2 20:36:31.622446 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:36:31.636399 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:36:31.636553 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:36:31.641823 systemd[1]: Startup finished in 715ms (kernel) + 15.635s (initrd) + 24.053s (userspace) = 40.405s. Oct 2 20:36:32.220105 login[1452]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 20:36:32.221853 login[1453]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:32.262791 systemd[1]: Created slice user-500.slice. Oct 2 20:36:32.263837 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:36:32.267396 systemd-logind[1339]: New session 2 of user core. Oct 2 20:36:32.305478 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:36:32.306950 systemd[1]: Starting user@500.service... Oct 2 20:36:32.340560 (systemd)[1456]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:36:32.595986 systemd[1456]: Queued start job for default target default.target. Oct 2 20:36:32.596488 systemd[1456]: Reached target paths.target. Oct 2 20:36:32.596503 systemd[1456]: Reached target sockets.target. Oct 2 20:36:32.596514 systemd[1456]: Reached target timers.target. Oct 2 20:36:32.596523 systemd[1456]: Reached target basic.target. Oct 2 20:36:32.596643 systemd[1]: Started user@500.service. Oct 2 20:36:32.597301 systemd[1456]: Reached target default.target. Oct 2 20:36:32.597336 systemd[1456]: Startup finished in 248ms. Oct 2 20:36:32.597420 systemd[1]: Started session-2.scope. Oct 2 20:36:33.419554 login[1452]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:33.424617 systemd[1]: Started session-1.scope. Oct 2 20:36:33.425059 systemd-logind[1339]: New session 1 of user core. Oct 2 20:36:38.240111 waagent[1447]: 2023-10-02T20:36:38.240002Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 20:36:38.265377 waagent[1447]: 2023-10-02T20:36:38.265292Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 20:36:38.269917 waagent[1447]: 2023-10-02T20:36:38.269854Z INFO Daemon Daemon Python: 3.9.16 Oct 2 20:36:38.274707 waagent[1447]: 2023-10-02T20:36:38.274613Z INFO Daemon Daemon Run daemon Oct 2 20:36:38.278904 waagent[1447]: 2023-10-02T20:36:38.278846Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 20:36:38.298813 waagent[1447]: 2023-10-02T20:36:38.298698Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:38.313641 waagent[1447]: 2023-10-02T20:36:38.313508Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:38.323382 waagent[1447]: 2023-10-02T20:36:38.323316Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:38.328276 waagent[1447]: 2023-10-02T20:36:38.328216Z INFO Daemon Daemon Using waagent for provisioning Oct 2 20:36:38.334123 waagent[1447]: 2023-10-02T20:36:38.334062Z INFO Daemon Daemon Activate resource disk Oct 2 20:36:38.338668 waagent[1447]: 2023-10-02T20:36:38.338612Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 20:36:38.352463 waagent[1447]: 2023-10-02T20:36:38.352400Z INFO Daemon Daemon Found device: None Oct 2 20:36:38.357196 waagent[1447]: 2023-10-02T20:36:38.357135Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 20:36:38.365347 waagent[1447]: 2023-10-02T20:36:38.365291Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 20:36:38.376646 waagent[1447]: 2023-10-02T20:36:38.376561Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:38.382419 waagent[1447]: 2023-10-02T20:36:38.382357Z INFO Daemon Daemon Running default provisioning handler Oct 2 20:36:38.398334 waagent[1447]: 2023-10-02T20:36:38.398214Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:38.412846 waagent[1447]: 2023-10-02T20:36:38.412706Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:38.422293 waagent[1447]: 2023-10-02T20:36:38.422228Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:38.427141 waagent[1447]: 2023-10-02T20:36:38.427084Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 20:36:38.519254 waagent[1447]: 2023-10-02T20:36:38.519062Z INFO Daemon Daemon Successfully mounted dvd Oct 2 20:36:38.630604 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 20:36:38.677474 waagent[1447]: 2023-10-02T20:36:38.677334Z INFO Daemon Daemon Detect protocol endpoint Oct 2 20:36:38.682545 waagent[1447]: 2023-10-02T20:36:38.682466Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:38.688403 waagent[1447]: 2023-10-02T20:36:38.688335Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 20:36:38.694897 waagent[1447]: 2023-10-02T20:36:38.694835Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 20:36:38.700332 waagent[1447]: 2023-10-02T20:36:38.700274Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 20:36:38.705436 waagent[1447]: 2023-10-02T20:36:38.705379Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 20:36:39.685361 waagent[1447]: 2023-10-02T20:36:39.685292Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 20:36:39.692395 waagent[1447]: 2023-10-02T20:36:39.692349Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 20:36:39.697728 waagent[1447]: 2023-10-02T20:36:39.697672Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 20:36:40.454390 waagent[1447]: 2023-10-02T20:36:40.454244Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 20:36:40.469424 waagent[1447]: 2023-10-02T20:36:40.469352Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 20:36:40.475267 waagent[1447]: 2023-10-02T20:36:40.475196Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 20:36:40.559883 waagent[1447]: 2023-10-02T20:36:40.559754Z INFO Daemon Daemon Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:40.568110 waagent[1447]: 2023-10-02T20:36:40.568042Z INFO Daemon Daemon Certificate with thumbprint 13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA has no matching private key. Oct 2 20:36:40.577354 waagent[1447]: 2023-10-02T20:36:40.577292Z INFO Daemon Daemon Fetch goal state completed Oct 2 20:36:40.628844 waagent[1447]: 2023-10-02T20:36:40.628784Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 0b2e992d-fc87-40e0-b6a3-690de472f867 New eTag: 12343175047163461324] Oct 2 20:36:40.639452 waagent[1447]: 2023-10-02T20:36:40.639379Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:40.655051 waagent[1447]: 2023-10-02T20:36:40.654980Z INFO Daemon Daemon Starting provisioning Oct 2 20:36:40.660093 waagent[1447]: 2023-10-02T20:36:40.660029Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 20:36:40.664675 waagent[1447]: 2023-10-02T20:36:40.664618Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-855b1f86a1] Oct 2 20:36:40.724910 waagent[1447]: 2023-10-02T20:36:40.724777Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-855b1f86a1] Oct 2 20:36:40.732238 waagent[1447]: 2023-10-02T20:36:40.732151Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 20:36:40.739456 waagent[1447]: 2023-10-02T20:36:40.739385Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 20:36:40.759218 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 20:36:40.759383 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 20:36:40.759440 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 20:36:40.759739 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:40.763643 systemd-networkd[1219]: eth0: DHCPv6 lease lost Oct 2 20:36:40.765647 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:40.765818 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:40.767770 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:40.800376 systemd-networkd[1504]: enP32769s1: Link UP Oct 2 20:36:40.800674 systemd-networkd[1504]: enP32769s1: Gained carrier Oct 2 20:36:40.801697 systemd-networkd[1504]: eth0: Link UP Oct 2 20:36:40.801776 systemd-networkd[1504]: eth0: Gained carrier Oct 2 20:36:40.802135 systemd-networkd[1504]: lo: Link UP Oct 2 20:36:40.802202 systemd-networkd[1504]: lo: Gained carrier Oct 2 20:36:40.802478 systemd-networkd[1504]: eth0: Gained IPv6LL Oct 2 20:36:40.803596 systemd-networkd[1504]: Enumeration completed Oct 2 20:36:40.803770 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:40.805445 systemd-networkd[1504]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:40.805456 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:40.808168 waagent[1447]: 2023-10-02T20:36:40.807907Z INFO Daemon Daemon Create user account if not exists Oct 2 20:36:40.815143 waagent[1447]: 2023-10-02T20:36:40.815063Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 20:36:40.822362 waagent[1447]: 2023-10-02T20:36:40.822278Z INFO Daemon Daemon Configure sudoer Oct 2 20:36:40.827825 waagent[1447]: 2023-10-02T20:36:40.827753Z INFO Daemon Daemon Configure sshd Oct 2 20:36:40.832251 waagent[1447]: 2023-10-02T20:36:40.832182Z INFO Daemon Daemon Deploy ssh public key. Oct 2 20:36:40.839686 systemd-networkd[1504]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:40.842653 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:42.085522 waagent[1447]: 2023-10-02T20:36:42.085456Z INFO Daemon Daemon Provisioning complete Oct 2 20:36:42.108515 waagent[1447]: 2023-10-02T20:36:42.108449Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 20:36:42.114916 waagent[1447]: 2023-10-02T20:36:42.114852Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 20:36:42.125535 waagent[1447]: 2023-10-02T20:36:42.125473Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 20:36:42.426135 waagent[1513]: 2023-10-02T20:36:42.426041Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 20:36:42.426918 waagent[1513]: 2023-10-02T20:36:42.426862Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:42.427052 waagent[1513]: 2023-10-02T20:36:42.427006Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:42.439201 waagent[1513]: 2023-10-02T20:36:42.439133Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 20:36:42.439356 waagent[1513]: 2023-10-02T20:36:42.439310Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 20:36:42.516448 waagent[1513]: 2023-10-02T20:36:42.516315Z INFO ExtHandler ExtHandler Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:42.516677 waagent[1513]: 2023-10-02T20:36:42.516623Z INFO ExtHandler ExtHandler Certificate with thumbprint 13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA has no matching private key. Oct 2 20:36:42.516911 waagent[1513]: 2023-10-02T20:36:42.516862Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 20:36:42.529882 waagent[1513]: 2023-10-02T20:36:42.529829Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 7d796bf8-545e-4db9-bbe7-2432d0e4bc09 New eTag: 12343175047163461324] Oct 2 20:36:42.530454 waagent[1513]: 2023-10-02T20:36:42.530397Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:42.607325 waagent[1513]: 2023-10-02T20:36:42.607178Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:42.617271 waagent[1513]: 2023-10-02T20:36:42.617197Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1513 Oct 2 20:36:42.620968 waagent[1513]: 2023-10-02T20:36:42.620907Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:42.622288 waagent[1513]: 2023-10-02T20:36:42.622230Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:42.741372 waagent[1513]: 2023-10-02T20:36:42.741250Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:42.741739 waagent[1513]: 2023-10-02T20:36:42.741683Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:42.751640 waagent[1513]: 2023-10-02T20:36:42.751552Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:42.752126 waagent[1513]: 2023-10-02T20:36:42.752068Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:42.753263 waagent[1513]: 2023-10-02T20:36:42.753202Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 20:36:42.754819 waagent[1513]: 2023-10-02T20:36:42.754747Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:42.755646 waagent[1513]: 2023-10-02T20:36:42.755565Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:42.755912 waagent[1513]: 2023-10-02T20:36:42.755862Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:42.756549 waagent[1513]: 2023-10-02T20:36:42.756493Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:42.756954 waagent[1513]: 2023-10-02T20:36:42.756899Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:42.756954 waagent[1513]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:42.756954 waagent[1513]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:42.756954 waagent[1513]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:42.756954 waagent[1513]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:42.756954 waagent[1513]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:42.756954 waagent[1513]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:42.759396 waagent[1513]: 2023-10-02T20:36:42.759237Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:42.760265 waagent[1513]: 2023-10-02T20:36:42.760204Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:42.760524 waagent[1513]: 2023-10-02T20:36:42.760473Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:42.761183 waagent[1513]: 2023-10-02T20:36:42.761124Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:42.761416 waagent[1513]: 2023-10-02T20:36:42.761369Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:42.761633 waagent[1513]: 2023-10-02T20:36:42.761564Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:42.762570 waagent[1513]: 2023-10-02T20:36:42.762515Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:42.762674 waagent[1513]: 2023-10-02T20:36:42.762609Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:42.763378 waagent[1513]: 2023-10-02T20:36:42.763299Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:42.763466 waagent[1513]: 2023-10-02T20:36:42.763401Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:42.763911 waagent[1513]: 2023-10-02T20:36:42.763843Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:42.774399 waagent[1513]: 2023-10-02T20:36:42.774330Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 20:36:42.775707 waagent[1513]: 2023-10-02T20:36:42.775642Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:42.776993 waagent[1513]: 2023-10-02T20:36:42.776928Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 20:36:42.801358 waagent[1513]: 2023-10-02T20:36:42.801229Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1504' Oct 2 20:36:42.818110 waagent[1513]: 2023-10-02T20:36:42.818042Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 20:36:42.883866 waagent[1513]: 2023-10-02T20:36:42.883731Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:42.883866 waagent[1513]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:42.883866 waagent[1513]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:42.883866 waagent[1513]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:eb:87 brd ff:ff:ff:ff:ff:ff Oct 2 20:36:42.883866 waagent[1513]: 3: enP32769s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:eb:87 brd ff:ff:ff:ff:ff:ff\ altname enP32769p0s2 Oct 2 20:36:42.883866 waagent[1513]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:42.883866 waagent[1513]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:42.883866 waagent[1513]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:42.883866 waagent[1513]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:42.883866 waagent[1513]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:42.883866 waagent[1513]: 2: eth0 inet6 fe80::222:48ff:fe7a:eb87/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:42.989261 waagent[1513]: 2023-10-02T20:36:42.989205Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Oct 2 20:36:43.128906 waagent[1447]: 2023-10-02T20:36:43.128744Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 20:36:43.132735 waagent[1447]: 2023-10-02T20:36:43.132685Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Oct 2 20:36:44.249093 waagent[1542]: 2023-10-02T20:36:44.248992Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Oct 2 20:36:44.249826 waagent[1542]: 2023-10-02T20:36:44.249765Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 20:36:44.249961 waagent[1542]: 2023-10-02T20:36:44.249915Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 20:36:44.259626 waagent[1542]: 2023-10-02T20:36:44.259495Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:44.260025 waagent[1542]: 2023-10-02T20:36:44.259969Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:44.260170 waagent[1542]: 2023-10-02T20:36:44.260122Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:44.277739 waagent[1542]: 2023-10-02T20:36:44.277664Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 20:36:44.286720 waagent[1542]: 2023-10-02T20:36:44.286664Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 20:36:44.287727 waagent[1542]: 2023-10-02T20:36:44.287671Z INFO ExtHandler Oct 2 20:36:44.287868 waagent[1542]: 2023-10-02T20:36:44.287823Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 04ce00d2-f8a3-4a5e-86db-4911629dd2f1 eTag: 12343175047163461324 source: Fabric] Oct 2 20:36:44.288590 waagent[1542]: 2023-10-02T20:36:44.288527Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 20:36:44.289791 waagent[1542]: 2023-10-02T20:36:44.289734Z INFO ExtHandler Oct 2 20:36:44.289920 waagent[1542]: 2023-10-02T20:36:44.289875Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 20:36:44.296113 waagent[1542]: 2023-10-02T20:36:44.296067Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 20:36:44.296552 waagent[1542]: 2023-10-02T20:36:44.296504Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:44.316782 waagent[1542]: 2023-10-02T20:36:44.316726Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 20:36:44.398861 waagent[1542]: 2023-10-02T20:36:44.398720Z INFO ExtHandler Downloaded certificate {'thumbprint': '96E73459C46BA3662DD73E07899B2530C5F3E5EB', 'hasPrivateKey': True} Oct 2 20:36:44.399955 waagent[1542]: 2023-10-02T20:36:44.399897Z INFO ExtHandler Downloaded certificate {'thumbprint': '13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA', 'hasPrivateKey': False} Oct 2 20:36:44.400985 waagent[1542]: 2023-10-02T20:36:44.400925Z INFO ExtHandler Fetch goal state completed Oct 2 20:36:44.426904 waagent[1542]: 2023-10-02T20:36:44.426836Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1542 Oct 2 20:36:44.430344 waagent[1542]: 2023-10-02T20:36:44.430282Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:44.431813 waagent[1542]: 2023-10-02T20:36:44.431757Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:44.437839 waagent[1542]: 2023-10-02T20:36:44.437775Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:44.438236 waagent[1542]: 2023-10-02T20:36:44.438173Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:44.448434 waagent[1542]: 2023-10-02T20:36:44.448366Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:44.448931 waagent[1542]: 2023-10-02T20:36:44.448876Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:44.456522 waagent[1542]: 2023-10-02T20:36:44.456413Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 20:36:44.460300 waagent[1542]: 2023-10-02T20:36:44.460241Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 20:36:44.461833 waagent[1542]: 2023-10-02T20:36:44.461760Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:44.462454 waagent[1542]: 2023-10-02T20:36:44.462395Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:44.462740 waagent[1542]: 2023-10-02T20:36:44.462686Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:44.463402 waagent[1542]: 2023-10-02T20:36:44.463346Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:44.463805 waagent[1542]: 2023-10-02T20:36:44.463752Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:44.463805 waagent[1542]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:44.463805 waagent[1542]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:44.463805 waagent[1542]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:44.463805 waagent[1542]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:44.463805 waagent[1542]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:44.463805 waagent[1542]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:44.466234 waagent[1542]: 2023-10-02T20:36:44.466114Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:44.466926 waagent[1542]: 2023-10-02T20:36:44.466863Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:44.467360 waagent[1542]: 2023-10-02T20:36:44.467303Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:44.467962 waagent[1542]: 2023-10-02T20:36:44.467824Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:44.469991 waagent[1542]: 2023-10-02T20:36:44.469838Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:44.470473 waagent[1542]: 2023-10-02T20:36:44.470387Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:44.471072 waagent[1542]: 2023-10-02T20:36:44.470996Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:44.471373 waagent[1542]: 2023-10-02T20:36:44.471296Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:44.473730 waagent[1542]: 2023-10-02T20:36:44.473664Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:44.474201 waagent[1542]: 2023-10-02T20:36:44.473972Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:44.476643 waagent[1542]: 2023-10-02T20:36:44.476416Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:44.492350 waagent[1542]: 2023-10-02T20:36:44.492284Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:44.492350 waagent[1542]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:44.492350 waagent[1542]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:44.492350 waagent[1542]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:eb:87 brd ff:ff:ff:ff:ff:ff Oct 2 20:36:44.492350 waagent[1542]: 3: enP32769s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:eb:87 brd ff:ff:ff:ff:ff:ff\ altname enP32769p0s2 Oct 2 20:36:44.492350 waagent[1542]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:44.492350 waagent[1542]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:44.492350 waagent[1542]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:44.492350 waagent[1542]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:44.492350 waagent[1542]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:44.492350 waagent[1542]: 2: eth0 inet6 fe80::222:48ff:fe7a:eb87/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:44.503706 waagent[1542]: 2023-10-02T20:36:44.503553Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Oct 2 20:36:44.505365 waagent[1542]: 2023-10-02T20:36:44.505294Z INFO ExtHandler ExtHandler Downloading manifest Oct 2 20:36:44.545478 waagent[1542]: 2023-10-02T20:36:44.545425Z INFO ExtHandler ExtHandler Oct 2 20:36:44.545795 waagent[1542]: 2023-10-02T20:36:44.545740Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: c5506c49-3f90-48ce-a3fc-bfd08405cfbf correlation 527f72f0-ab9a-437e-809b-df81ebfe9b6b created: 2023-10-02T20:35:07.769318Z] Oct 2 20:36:44.546762 waagent[1542]: 2023-10-02T20:36:44.546705Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 20:36:44.548632 waagent[1542]: 2023-10-02T20:36:44.548566Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Oct 2 20:36:44.572263 waagent[1542]: 2023-10-02T20:36:44.572192Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 20:36:44.591237 waagent[1542]: 2023-10-02T20:36:44.591151Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: EFDB2F0C-9874-427E-87BF-EAA730F7B5E7;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 20:36:44.743072 waagent[1542]: 2023-10-02T20:36:44.742941Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 20:36:44.743072 waagent[1542]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.743072 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.743072 waagent[1542]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.743072 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.743072 waagent[1542]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.743072 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.743072 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:44.743072 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:44.743072 waagent[1542]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:44.751851 waagent[1542]: 2023-10-02T20:36:44.751734Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 20:36:44.751851 waagent[1542]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.751851 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.751851 waagent[1542]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.751851 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.751851 waagent[1542]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:44.751851 waagent[1542]: pkts bytes target prot opt in out source destination Oct 2 20:36:44.751851 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:44.751851 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:44.751851 waagent[1542]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:44.752372 waagent[1542]: 2023-10-02T20:36:44.752318Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 20:37:06.515886 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Oct 2 20:37:14.271266 update_engine[1341]: I1002 20:37:14.270869 1341 update_attempter.cc:505] Updating boot flags... Oct 2 20:37:14.842534 systemd[1]: Created slice system-sshd.slice. Oct 2 20:37:14.844146 systemd[1]: Started sshd@0-10.200.20.39:22-10.200.12.6:37042.service. Oct 2 20:37:15.502020 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 37042 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:15.520088 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:15.524656 systemd[1]: Started session-3.scope. Oct 2 20:37:15.525620 systemd-logind[1339]: New session 3 of user core. Oct 2 20:37:15.871616 systemd[1]: Started sshd@1-10.200.20.39:22-10.200.12.6:37058.service. Oct 2 20:37:16.287658 sshd[1664]: Accepted publickey for core from 10.200.12.6 port 37058 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:16.289461 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:16.293551 systemd[1]: Started session-4.scope. Oct 2 20:37:16.294114 systemd-logind[1339]: New session 4 of user core. Oct 2 20:37:16.592416 sshd[1664]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:16.595290 systemd-logind[1339]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:37:16.595291 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:37:16.596256 systemd[1]: sshd@1-10.200.20.39:22-10.200.12.6:37058.service: Deactivated successfully. Oct 2 20:37:16.597005 systemd-logind[1339]: Removed session 4. Oct 2 20:37:16.666932 systemd[1]: Started sshd@2-10.200.20.39:22-10.200.12.6:37064.service. Oct 2 20:37:17.118446 sshd[1670]: Accepted publickey for core from 10.200.12.6 port 37064 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:17.120046 sshd[1670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:17.123881 systemd-logind[1339]: New session 5 of user core. Oct 2 20:37:17.124266 systemd[1]: Started session-5.scope. Oct 2 20:37:17.439923 sshd[1670]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:17.442556 systemd[1]: sshd@2-10.200.20.39:22-10.200.12.6:37064.service: Deactivated successfully. Oct 2 20:37:17.443208 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:37:17.443733 systemd-logind[1339]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:37:17.444514 systemd-logind[1339]: Removed session 5. Oct 2 20:37:17.509478 systemd[1]: Started sshd@3-10.200.20.39:22-10.200.12.6:44614.service. Oct 2 20:37:17.928235 sshd[1676]: Accepted publickey for core from 10.200.12.6 port 44614 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:17.929786 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:17.933706 systemd-logind[1339]: New session 6 of user core. Oct 2 20:37:17.934114 systemd[1]: Started session-6.scope. Oct 2 20:37:18.233831 sshd[1676]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:18.236755 systemd-logind[1339]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:37:18.236835 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:37:18.237858 systemd[1]: sshd@3-10.200.20.39:22-10.200.12.6:44614.service: Deactivated successfully. Oct 2 20:37:18.238531 systemd-logind[1339]: Removed session 6. Oct 2 20:37:18.303462 systemd[1]: Started sshd@4-10.200.20.39:22-10.200.12.6:44616.service. Oct 2 20:37:18.720898 sshd[1682]: Accepted publickey for core from 10.200.12.6 port 44616 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:18.722458 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:18.726436 systemd-logind[1339]: New session 7 of user core. Oct 2 20:37:18.726887 systemd[1]: Started session-7.scope. Oct 2 20:37:19.221757 sudo[1688]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:37:19.221955 sudo[1688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:19.264527 dbus-daemon[1325]: avc: received setenforce notice (enforcing=1) Oct 2 20:37:19.264699 sudo[1688]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:19.345900 sshd[1682]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:19.349020 systemd-logind[1339]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:37:19.350449 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:37:19.351548 systemd-logind[1339]: Removed session 7. Oct 2 20:37:19.351986 systemd[1]: sshd@4-10.200.20.39:22-10.200.12.6:44616.service: Deactivated successfully. Oct 2 20:37:19.415144 systemd[1]: Started sshd@5-10.200.20.39:22-10.200.12.6:44622.service. Oct 2 20:37:19.833698 sshd[1692]: Accepted publickey for core from 10.200.12.6 port 44622 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:19.835564 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:19.839709 systemd[1]: Started session-8.scope. Oct 2 20:37:19.840922 systemd-logind[1339]: New session 8 of user core. Oct 2 20:37:20.072975 sudo[1696]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:37:20.073447 sudo[1696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:20.076816 sudo[1696]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:20.082533 sudo[1695]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:37:20.082767 sudo[1695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:20.093555 systemd[1]: Stopping audit-rules.service... Oct 2 20:37:20.094000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:20.099274 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:37:20.099349 kernel: audit: type=1305 audit(1696279040.094:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:20.100802 auditctl[1699]: No rules Oct 2 20:37:20.101451 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:37:20.101648 systemd[1]: Stopped audit-rules.service. Oct 2 20:37:20.103219 systemd[1]: Starting audit-rules.service... Oct 2 20:37:20.094000 audit[1699]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc1618cd0 a2=420 a3=0 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.132690 kernel: audit: type=1300 audit(1696279040.094:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc1618cd0 a2=420 a3=0 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.132793 kernel: audit: type=1327 audit(1696279040.094:171): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:20.094000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:20.139213 kernel: audit: type=1131 audit(1696279040.101:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.145200 augenrules[1716]: No rules Oct 2 20:37:20.146344 systemd[1]: Finished audit-rules.service. Oct 2 20:37:20.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.170025 kernel: audit: type=1130 audit(1696279040.145:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.170272 sudo[1695]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:20.169000 audit[1695]: USER_END pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.189038 kernel: audit: type=1106 audit(1696279040.169:174): pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.169000 audit[1695]: CRED_DISP pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.204670 kernel: audit: type=1104 audit(1696279040.169:175): pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.234838 sshd[1692]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:20.235000 audit[1692]: USER_END pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.235000 audit[1692]: CRED_DISP pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.260089 kernel: audit: type=1106 audit(1696279040.235:176): pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.260166 kernel: audit: type=1104 audit(1696279040.235:177): pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.259028 systemd[1]: sshd@5-10.200.20.39:22-10.200.12.6:44622.service: Deactivated successfully. Oct 2 20:37:20.259763 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:37:20.276765 systemd-logind[1339]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:37:20.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:44622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.294087 kernel: audit: type=1131 audit(1696279040.258:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:44622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.294461 systemd-logind[1339]: Removed session 8. Oct 2 20:37:20.309927 systemd[1]: Started sshd@6-10.200.20.39:22-10.200.12.6:44630.service. Oct 2 20:37:20.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.759000 audit[1722]: USER_ACCT pid=1722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.760576 sshd[1722]: Accepted publickey for core from 10.200.12.6 port 44630 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:20.761000 audit[1722]: CRED_ACQ pid=1722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.761000 audit[1722]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4c928a0 a2=3 a3=1 items=0 ppid=1 pid=1722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:37:20.762521 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:20.766226 systemd-logind[1339]: New session 9 of user core. Oct 2 20:37:20.766668 systemd[1]: Started session-9.scope. Oct 2 20:37:20.770000 audit[1722]: USER_START pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.772000 audit[1724]: CRED_ACQ pid=1724 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:21.016000 audit[1725]: USER_ACCT pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.017516 sudo[1725]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:37:21.017000 audit[1725]: CRED_REFR pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.018042 sudo[1725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:21.019000 audit[1725]: USER_START pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.696045 systemd[1]: Starting docker.service... Oct 2 20:37:21.744493 env[1740]: time="2023-10-02T20:37:21.744435152Z" level=info msg="Starting up" Oct 2 20:37:21.745959 env[1740]: time="2023-10-02T20:37:21.745933551Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:21.746056 env[1740]: time="2023-10-02T20:37:21.746042431Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:21.746124 env[1740]: time="2023-10-02T20:37:21.746108511Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:21.746179 env[1740]: time="2023-10-02T20:37:21.746166951Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:21.748474 env[1740]: time="2023-10-02T20:37:21.748442710Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:21.748474 env[1740]: time="2023-10-02T20:37:21.748468590Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:21.748566 env[1740]: time="2023-10-02T20:37:21.748483310Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:21.748566 env[1740]: time="2023-10-02T20:37:21.748492510Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:21.753690 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3708242644-merged.mount: Deactivated successfully. Oct 2 20:37:21.818475 env[1740]: time="2023-10-02T20:37:21.818405607Z" level=info msg="Loading containers: start." Oct 2 20:37:21.906000 audit[1767]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.906000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc64291b0 a2=0 a3=1 items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 20:37:21.909000 audit[1769]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.909000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff2d233e0 a2=0 a3=1 items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 20:37:21.912000 audit[1771]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.912000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff4e0ad70 a2=0 a3=1 items=0 ppid=1740 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:21.915000 audit[1773]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.915000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff3d958a0 a2=0 a3=1 items=0 ppid=1740 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:21.918000 audit[1775]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.918000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff6099380 a2=0 a3=1 items=0 ppid=1740 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 20:37:21.920000 audit[1777]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.920000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd78c0660 a2=0 a3=1 items=0 ppid=1740 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 20:37:21.939000 audit[1780]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.939000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff0502c40 a2=0 a3=1 items=0 ppid=1740 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 20:37:21.942000 audit[1782]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.942000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc5fb1260 a2=0 a3=1 items=0 ppid=1740 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 20:37:21.945000 audit[1784]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.945000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe76b3af0 a2=0 a3=1 items=0 ppid=1740 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:21.959000 audit[1788]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.959000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcc56aa10 a2=0 a3=1 items=0 ppid=1740 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:21.962000 audit[1789]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.962000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffea010d20 a2=0 a3=1 items=0 ppid=1740 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:22.016612 kernel: Initializing XFRM netlink socket Oct 2 20:37:22.041084 env[1740]: time="2023-10-02T20:37:22.041049212Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 20:37:22.122000 audit[1797]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.122000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff367ca70 a2=0 a3=1 items=0 ppid=1740 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 20:37:22.152000 audit[1800]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.152000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcd1a62a0 a2=0 a3=1 items=0 ppid=1740 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 20:37:22.156000 audit[1803]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.156000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffd2280a0 a2=0 a3=1 items=0 ppid=1740 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:22.159000 audit[1805]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.159000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd3a2e540 a2=0 a3=1 items=0 ppid=1740 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:22.162000 audit[1807]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.162000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd60c3300 a2=0 a3=1 items=0 ppid=1740 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 20:37:22.165000 audit[1809]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.165000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff05a1820 a2=0 a3=1 items=0 ppid=1740 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 20:37:22.168000 audit[1811]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.168000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd2a37cb0 a2=0 a3=1 items=0 ppid=1740 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 20:37:22.171000 audit[1813]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.171000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcc3339f0 a2=0 a3=1 items=0 ppid=1740 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 20:37:22.174000 audit[1815]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.174000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffffe5800 a2=0 a3=1 items=0 ppid=1740 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:22.177000 audit[1817]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.177000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffdb7871a0 a2=0 a3=1 items=0 ppid=1740 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:22.180000 audit[1819]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.180000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe0933c90 a2=0 a3=1 items=0 ppid=1740 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 20:37:22.182026 systemd-networkd[1504]: docker0: Link UP Oct 2 20:37:22.196000 audit[1823]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.196000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce69b6e0 a2=0 a3=1 items=0 ppid=1740 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:22.198000 audit[1824]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.198000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe9aa3f30 a2=0 a3=1 items=0 ppid=1740 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:22.199792 env[1740]: time="2023-10-02T20:37:22.199756602Z" level=info msg="Loading containers: done." Oct 2 20:37:22.211859 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1368223867-merged.mount: Deactivated successfully. Oct 2 20:37:22.277558 env[1740]: time="2023-10-02T20:37:22.277507858Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 20:37:22.277822 env[1740]: time="2023-10-02T20:37:22.277749297Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 20:37:22.277870 env[1740]: time="2023-10-02T20:37:22.277850337Z" level=info msg="Daemon has completed initialization" Oct 2 20:37:22.305804 systemd[1]: Started docker.service. Oct 2 20:37:22.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:22.310969 env[1740]: time="2023-10-02T20:37:22.310912407Z" level=info msg="API listen on /run/docker.sock" Oct 2 20:37:22.334188 systemd[1]: Reloading. Oct 2 20:37:22.427657 /usr/lib/systemd/system-generators/torcx-generator[1872]: time="2023-10-02T20:37:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:22.428051 /usr/lib/systemd/system-generators/torcx-generator[1872]: time="2023-10-02T20:37:22Z" level=info msg="torcx already run" Oct 2 20:37:22.527361 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:22.527379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:22.545814 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit: BPF prog-id=35 op=LOAD Oct 2 20:37:22.613000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.613000 audit: BPF prog-id=36 op=LOAD Oct 2 20:37:22.613000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.614000 audit: BPF prog-id=37 op=LOAD Oct 2 20:37:22.614000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit: BPF prog-id=38 op=LOAD Oct 2 20:37:22.615000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit: BPF prog-id=39 op=LOAD Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit: BPF prog-id=40 op=LOAD Oct 2 20:37:22.615000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:37:22.615000 audit: BPF prog-id=20 op=UNLOAD Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit: BPF prog-id=41 op=LOAD Oct 2 20:37:22.616000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit: BPF prog-id=42 op=LOAD Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.616000 audit: BPF prog-id=43 op=LOAD Oct 2 20:37:22.616000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:37:22.616000 audit: BPF prog-id=26 op=UNLOAD Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.617000 audit: BPF prog-id=44 op=LOAD Oct 2 20:37:22.617000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit: BPF prog-id=45 op=LOAD Oct 2 20:37:22.618000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit: BPF prog-id=46 op=LOAD Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.618000 audit: BPF prog-id=47 op=LOAD Oct 2 20:37:22.618000 audit: BPF prog-id=30 op=UNLOAD Oct 2 20:37:22.618000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit: BPF prog-id=48 op=LOAD Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.620000 audit: BPF prog-id=49 op=LOAD Oct 2 20:37:22.620000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:37:22.620000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:37:22.628149 systemd[1]: Started kubelet.service. Oct 2 20:37:22.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:22.707774 kubelet[1931]: E1002 20:37:22.707700 1931 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 20:37:22.709858 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:22.709982 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:22.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:26.286327 env[1350]: time="2023-10-02T20:37:26.286282963Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\"" Oct 2 20:37:27.134861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1623947122.mount: Deactivated successfully. Oct 2 20:37:30.709164 env[1350]: time="2023-10-02T20:37:30.709114129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:30.714104 env[1350]: time="2023-10-02T20:37:30.714071824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:58571c8a72517919f341c2a8603a9242fe278cd95e62ddebc4cf3efe3e168d99,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:30.718272 env[1350]: time="2023-10-02T20:37:30.718244517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:30.723133 env[1350]: time="2023-10-02T20:37:30.723107372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:30.723874 env[1350]: time="2023-10-02T20:37:30.723842215Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:58571c8a72517919f341c2a8603a9242fe278cd95e62ddebc4cf3efe3e168d99\"" Oct 2 20:37:30.738224 env[1350]: time="2023-10-02T20:37:30.738194419Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\"" Oct 2 20:37:32.921946 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 20:37:32.922120 systemd[1]: Stopped kubelet.service. Oct 2 20:37:32.942865 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 20:37:32.942969 kernel: audit: type=1130 audit(1696279052.921:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.923623 systemd[1]: Started kubelet.service. Oct 2 20:37:32.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.959291 kernel: audit: type=1131 audit(1696279052.921:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.976634 kernel: audit: type=1130 audit(1696279052.923:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:33.016368 kubelet[1955]: E1002 20:37:33.016307 1955 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 20:37:33.019069 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:33.019203 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:33.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:33.036612 kernel: audit: type=1131 audit(1696279053.018:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:34.119495 env[1350]: time="2023-10-02T20:37:34.119439532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:34.124305 env[1350]: time="2023-10-02T20:37:34.124267345Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e1da3e9c4659a618e29cd50e4886012580580648b2fb04105edf183286f34013,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:34.130660 env[1350]: time="2023-10-02T20:37:34.130627563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:34.136541 env[1350]: time="2023-10-02T20:37:34.136502019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:34.137312 env[1350]: time="2023-10-02T20:37:34.137284341Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:e1da3e9c4659a618e29cd50e4886012580580648b2fb04105edf183286f34013\"" Oct 2 20:37:34.151142 env[1350]: time="2023-10-02T20:37:34.151108940Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\"" Oct 2 20:37:36.593533 env[1350]: time="2023-10-02T20:37:36.593470245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.599743 env[1350]: time="2023-10-02T20:37:36.599700622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d3203514e67865690cf9b02fb09ac764a9814be5e3178b1aa7a7cb0bd8683803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.604106 env[1350]: time="2023-10-02T20:37:36.604074553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.607648 env[1350]: time="2023-10-02T20:37:36.607623242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.608331 env[1350]: time="2023-10-02T20:37:36.608305844Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:d3203514e67865690cf9b02fb09ac764a9814be5e3178b1aa7a7cb0bd8683803\"" Oct 2 20:37:36.620646 env[1350]: time="2023-10-02T20:37:36.620622197Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 20:37:37.653496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3224258351.mount: Deactivated successfully. Oct 2 20:37:38.948765 env[1350]: time="2023-10-02T20:37:38.948713561Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:38.955460 env[1350]: time="2023-10-02T20:37:38.955427138Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0393a046c6ac3c39d56f9b536c02216184f07904e0db26449490d0cb1d1fe343,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:38.960216 env[1350]: time="2023-10-02T20:37:38.960172590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:38.964660 env[1350]: time="2023-10-02T20:37:38.964614801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:38.965226 env[1350]: time="2023-10-02T20:37:38.965191762Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:0393a046c6ac3c39d56f9b536c02216184f07904e0db26449490d0cb1d1fe343\"" Oct 2 20:37:38.978982 env[1350]: time="2023-10-02T20:37:38.978940597Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 20:37:39.642555 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3759119989.mount: Deactivated successfully. Oct 2 20:37:39.659743 env[1350]: time="2023-10-02T20:37:39.659702410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:39.664931 env[1350]: time="2023-10-02T20:37:39.664905903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:39.669040 env[1350]: time="2023-10-02T20:37:39.669017673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:39.673128 env[1350]: time="2023-10-02T20:37:39.673105883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:39.673750 env[1350]: time="2023-10-02T20:37:39.673728285Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 20:37:39.686945 env[1350]: time="2023-10-02T20:37:39.686915877Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 20:37:40.617752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2015938481.mount: Deactivated successfully. Oct 2 20:37:43.171879 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 20:37:43.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.172053 systemd[1]: Stopped kubelet.service. Oct 2 20:37:43.173505 systemd[1]: Started kubelet.service. Oct 2 20:37:43.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.207401 kernel: audit: type=1130 audit(1696279063.171:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.207553 kernel: audit: type=1131 audit(1696279063.171:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.207611 kernel: audit: type=1130 audit(1696279063.173:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.278135 kubelet[1982]: E1002 20:37:43.278075 1982 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 20:37:43.280648 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:43.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:43.280779 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:43.299622 kernel: audit: type=1131 audit(1696279063.280:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:43.798306 env[1350]: time="2023-10-02T20:37:43.798234727Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:43.804810 env[1350]: time="2023-10-02T20:37:43.804771621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:43.809651 env[1350]: time="2023-10-02T20:37:43.809606152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:43.814645 env[1350]: time="2023-10-02T20:37:43.814614242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:43.815342 env[1350]: time="2023-10-02T20:37:43.815314244Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Oct 2 20:37:43.828132 env[1350]: time="2023-10-02T20:37:43.828089752Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 20:37:44.600211 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1871217879.mount: Deactivated successfully. Oct 2 20:37:44.979540 env[1350]: time="2023-10-02T20:37:44.979475211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:44.983965 env[1350]: time="2023-10-02T20:37:44.983927420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:44.987436 env[1350]: time="2023-10-02T20:37:44.987403348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:44.989888 env[1350]: time="2023-10-02T20:37:44.989847433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:44.990261 env[1350]: time="2023-10-02T20:37:44.990232714Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Oct 2 20:37:49.031385 systemd[1]: Stopped kubelet.service. Oct 2 20:37:49.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:49.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:49.070772 kernel: audit: type=1130 audit(1696279069.030:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:49.070860 kernel: audit: type=1131 audit(1696279069.030:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:49.083687 systemd[1]: Reloading. Oct 2 20:37:49.176111 /usr/lib/systemd/system-generators/torcx-generator[2073]: time="2023-10-02T20:37:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:49.176445 /usr/lib/systemd/system-generators/torcx-generator[2073]: time="2023-10-02T20:37:49Z" level=info msg="torcx already run" Oct 2 20:37:49.283966 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:49.284388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:49.303113 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.396457 kernel: audit: type=1400 audit(1696279069.370:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.396565 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:37:49.396611 kernel: audit: type=1400 audit(1696279069.370:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.421933 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:37:49.422031 kernel: audit: type=1400 audit(1696279069.370:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.442082 kernel: audit: backlog limit exceeded Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.467266 kernel: audit: type=1400 audit(1696279069.370:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.467379 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.387000 audit: BPF prog-id=50 op=LOAD Oct 2 20:37:49.387000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit: BPF prog-id=51 op=LOAD Oct 2 20:37:49.388000 audit: BPF prog-id=36 op=UNLOAD Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.389000 audit: BPF prog-id=52 op=LOAD Oct 2 20:37:49.389000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit: BPF prog-id=53 op=LOAD Oct 2 20:37:49.390000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit: BPF prog-id=54 op=LOAD Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.447000 audit: BPF prog-id=55 op=LOAD Oct 2 20:37:49.447000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:37:49.447000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit: BPF prog-id=56 op=LOAD Oct 2 20:37:49.472000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit: BPF prog-id=57 op=LOAD Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.472000 audit: BPF prog-id=58 op=LOAD Oct 2 20:37:49.472000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:37:49.472000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.473000 audit: BPF prog-id=59 op=LOAD Oct 2 20:37:49.473000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.474000 audit: BPF prog-id=60 op=LOAD Oct 2 20:37:49.474000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit: BPF prog-id=61 op=LOAD Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.475000 audit: BPF prog-id=62 op=LOAD Oct 2 20:37:49.475000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:37:49.475000 audit: BPF prog-id=47 op=UNLOAD Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit: BPF prog-id=63 op=LOAD Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.476000 audit: BPF prog-id=64 op=LOAD Oct 2 20:37:49.476000 audit: BPF prog-id=48 op=UNLOAD Oct 2 20:37:49.476000 audit: BPF prog-id=49 op=UNLOAD Oct 2 20:37:49.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:49.492028 systemd[1]: Started kubelet.service. Oct 2 20:37:49.562521 kubelet[2132]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:49.562521 kubelet[2132]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:49.562521 kubelet[2132]: I1002 20:37:49.560157 2132 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:49.562985 kubelet[2132]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:49.562985 kubelet[2132]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:51.229503 kubelet[2132]: I1002 20:37:51.229475 2132 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 20:37:51.229886 kubelet[2132]: I1002 20:37:51.229873 2132 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:51.230197 kubelet[2132]: I1002 20:37:51.230183 2132 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 20:37:51.233507 kubelet[2132]: E1002 20:37:51.233477 2132 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.39:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.233605 kubelet[2132]: I1002 20:37:51.233524 2132 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:51.235709 kubelet[2132]: W1002 20:37:51.235695 2132 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:51.236312 kubelet[2132]: I1002 20:37:51.236288 2132 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:51.236708 kubelet[2132]: I1002 20:37:51.236696 2132 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:51.236844 kubelet[2132]: I1002 20:37:51.236830 2132 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:37:51.236994 kubelet[2132]: I1002 20:37:51.236983 2132 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:51.237054 kubelet[2132]: I1002 20:37:51.237046 2132 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 20:37:51.237221 kubelet[2132]: I1002 20:37:51.237209 2132 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:51.241109 kubelet[2132]: I1002 20:37:51.240572 2132 kubelet.go:398] "Attempting to sync node with API server" Oct 2 20:37:51.241221 kubelet[2132]: I1002 20:37:51.241208 2132 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:51.241361 kubelet[2132]: W1002 20:37:51.241073 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-855b1f86a1&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.241405 kubelet[2132]: E1002 20:37:51.241377 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-855b1f86a1&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.241405 kubelet[2132]: I1002 20:37:51.241338 2132 kubelet.go:297] "Adding apiserver pod source" Oct 2 20:37:51.241405 kubelet[2132]: I1002 20:37:51.241401 2132 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:51.242181 kubelet[2132]: I1002 20:37:51.242152 2132 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:51.242662 kubelet[2132]: W1002 20:37:51.242642 2132 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:37:51.243045 kubelet[2132]: I1002 20:37:51.243020 2132 server.go:1186] "Started kubelet" Oct 2 20:37:51.243162 kubelet[2132]: W1002 20:37:51.243127 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.243162 kubelet[2132]: E1002 20:37:51.243164 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.244000 audit[2132]: AVC avc: denied { mac_admin } for pid=2132 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:51.244000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:51.244000 audit[2132]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a9b3e0 a1=4000d7c8e8 a2=4000a9b3b0 a3=25 items=0 ppid=1 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.244000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:51.244000 audit[2132]: AVC avc: denied { mac_admin } for pid=2132 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:51.244000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:51.244000 audit[2132]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d807c0 a1=4000d7c900 a2=4000a9b470 a3=25 items=0 ppid=1 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.244000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:51.245047 kubelet[2132]: I1002 20:37:51.244784 2132 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:51.245047 kubelet[2132]: I1002 20:37:51.244827 2132 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:51.245047 kubelet[2132]: I1002 20:37:51.244884 2132 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:51.246351 kubelet[2132]: E1002 20:37:51.246272 2132 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-855b1f86a1.178a64d3f95e606e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-855b1f86a1", UID:"ci-3510.3.0-a-855b1f86a1", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-855b1f86a1"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 51, 243001966, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 51, 243001966, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.39:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.39:6443: connect: connection refused'(may retry after sleeping) Oct 2 20:37:51.247563 kubelet[2132]: I1002 20:37:51.247546 2132 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:51.248163 kubelet[2132]: I1002 20:37:51.248148 2132 server.go:451] "Adding debug handlers to kubelet server" Oct 2 20:37:51.249473 kubelet[2132]: E1002 20:37:51.249455 2132 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:51.249571 kubelet[2132]: E1002 20:37:51.249560 2132 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:51.249731 kubelet[2132]: I1002 20:37:51.249721 2132 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 20:37:51.249842 kubelet[2132]: I1002 20:37:51.249831 2132 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 20:37:51.250267 kubelet[2132]: W1002 20:37:51.250239 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.250357 kubelet[2132]: E1002 20:37:51.250348 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.251155 kubelet[2132]: E1002 20:37:51.251134 2132 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.253000 audit[2143]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.253000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc82265a0 a2=0 a3=1 items=0 ppid=2132 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:51.256000 audit[2144]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.256000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdd86c10 a2=0 a3=1 items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:37:51.261000 audit[2146]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.261000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe9c00d20 a2=0 a3=1 items=0 ppid=2132 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:51.267000 audit[2149]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.267000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc4efda70 a2=0 a3=1 items=0 ppid=2132 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:51.310000 audit[2154]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.310000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff15cb8d0 a2=0 a3=1 items=0 ppid=2132 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:37:51.312000 audit[2155]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.312000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe258b610 a2=0 a3=1 items=0 ppid=2132 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:37:51.334000 audit[2158]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.334000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff9c9c510 a2=0 a3=1 items=0 ppid=2132 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:37:51.387897 kubelet[2132]: I1002 20:37:51.387863 2132 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.388676 kubelet[2132]: I1002 20:37:51.388658 2132 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:37:51.388676 kubelet[2132]: I1002 20:37:51.388676 2132 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:51.388750 kubelet[2132]: I1002 20:37:51.388693 2132 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:51.389118 kubelet[2132]: E1002 20:37:51.389100 2132 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.392000 audit[2162]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.392000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe4179910 a2=0 a3=1 items=0 ppid=2132 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:37:51.393839 kubelet[2132]: I1002 20:37:51.393787 2132 policy_none.go:49] "None policy: Start" Oct 2 20:37:51.394344 kubelet[2132]: I1002 20:37:51.394330 2132 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:37:51.394431 kubelet[2132]: I1002 20:37:51.394421 2132 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:51.394000 audit[2163]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.394000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd164c420 a2=0 a3=1 items=0 ppid=2132 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:37:51.396000 audit[2164]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.396000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbac5fb0 a2=0 a3=1 items=0 ppid=2132 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:37:51.401659 systemd[1]: Created slice kubepods.slice. Oct 2 20:37:51.404000 audit[2166]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.404000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd4d3ee10 a2=0 a3=1 items=0 ppid=2132 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:37:51.405495 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:37:51.408396 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:37:51.409000 audit[2168]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.409000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd6685690 a2=0 a3=1 items=0 ppid=2132 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:37:51.413280 kubelet[2132]: I1002 20:37:51.413249 2132 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:51.412000 audit[2132]: AVC avc: denied { mac_admin } for pid=2132 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:51.412000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:51.412000 audit[2132]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b34600 a1=4000aa97e8 a2=4000b345d0 a3=25 items=0 ppid=1 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.412000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:51.413481 kubelet[2132]: I1002 20:37:51.413320 2132 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:51.413505 kubelet[2132]: I1002 20:37:51.413480 2132 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:51.414490 kubelet[2132]: E1002 20:37:51.414333 2132 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-855b1f86a1\" not found" Oct 2 20:37:51.416000 audit[2170]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.416000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffe16f7d50 a2=0 a3=1 items=0 ppid=2132 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:37:51.419000 audit[2172]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.419000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffee5a4a00 a2=0 a3=1 items=0 ppid=2132 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:37:51.422000 audit[2174]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.422000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffee2df480 a2=0 a3=1 items=0 ppid=2132 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:37:51.423867 kubelet[2132]: I1002 20:37:51.423846 2132 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:51.424000 audit[2175]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.424000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeabc2960 a2=0 a3=1 items=0 ppid=2132 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:51.424000 audit[2176]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.424000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6f27e40 a2=0 a3=1 items=0 ppid=2132 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:51.426000 audit[2177]: NETFILTER_CFG table=nat:46 family=10 entries=2 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.426000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcbab5ba0 a2=0 a3=1 items=0 ppid=2132 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 20:37:51.427000 audit[2178]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.427000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7b8b750 a2=0 a3=1 items=0 ppid=2132 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:51.429000 audit[2180]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:51.429000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3dd1790 a2=0 a3=1 items=0 ppid=2132 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:51.429000 audit[2181]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.429000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffefaa50e0 a2=0 a3=1 items=0 ppid=2132 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 20:37:51.431000 audit[2182]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.431000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd52df100 a2=0 a3=1 items=0 ppid=2132 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:37:51.434000 audit[2184]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.434000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffd0f0b950 a2=0 a3=1 items=0 ppid=2132 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 20:37:51.435000 audit[2185]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.435000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee37b170 a2=0 a3=1 items=0 ppid=2132 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 20:37:51.437000 audit[2186]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.437000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd749a050 a2=0 a3=1 items=0 ppid=2132 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:37:51.440000 audit[2188]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.440000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcded2850 a2=0 a3=1 items=0 ppid=2132 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 20:37:51.443000 audit[2190]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.443000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc150f680 a2=0 a3=1 items=0 ppid=2132 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:37:51.446000 audit[2192]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.446000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc8ae3700 a2=0 a3=1 items=0 ppid=2132 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 20:37:51.449000 audit[2194]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.449000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffdd6a7020 a2=0 a3=1 items=0 ppid=2132 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 20:37:51.452412 kubelet[2132]: E1002 20:37:51.452379 2132 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.469000 audit[2196]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.469000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffd54f23e0 a2=0 a3=1 items=0 ppid=2132 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 20:37:51.470613 kubelet[2132]: I1002 20:37:51.470585 2132 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:51.470701 kubelet[2132]: I1002 20:37:51.470691 2132 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 20:37:51.470766 kubelet[2132]: I1002 20:37:51.470757 2132 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 20:37:51.470848 kubelet[2132]: E1002 20:37:51.470840 2132 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 20:37:51.471274 kubelet[2132]: W1002 20:37:51.471250 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.471382 kubelet[2132]: E1002 20:37:51.471372 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.472000 audit[2197]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.472000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec05fee0 a2=0 a3=1 items=0 ppid=2132 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:51.473000 audit[2198]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.473000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0b77a40 a2=0 a3=1 items=0 ppid=2132 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:51.475000 audit[2199]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:51.475000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcca52610 a2=0 a3=1 items=0 ppid=2132 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:51.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:51.574377 kubelet[2132]: I1002 20:37:51.571311 2132 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:51.574377 kubelet[2132]: I1002 20:37:51.574036 2132 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:51.575521 kubelet[2132]: I1002 20:37:51.575489 2132 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:51.576795 kubelet[2132]: I1002 20:37:51.576779 2132 status_manager.go:698] "Failed to get status for pod" podUID=4f2982729002ad4d8a70233537c054bf pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-855b1f86a1\": dial tcp 10.200.20.39:6443: connect: connection refused" Oct 2 20:37:51.577805 kubelet[2132]: I1002 20:37:51.577791 2132 status_manager.go:698] "Failed to get status for pod" podUID=a813f6adf5d3baeb29bae4be7076ba29 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-855b1f86a1\": dial tcp 10.200.20.39:6443: connect: connection refused" Oct 2 20:37:51.578997 kubelet[2132]: I1002 20:37:51.578962 2132 status_manager.go:698] "Failed to get status for pod" podUID=8ae2b683df81fcee40a220444e7b529b pod="kube-system/kube-scheduler-ci-3510.3.0-a-855b1f86a1" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-855b1f86a1\": dial tcp 10.200.20.39:6443: connect: connection refused" Oct 2 20:37:51.580245 systemd[1]: Created slice kubepods-burstable-pod4f2982729002ad4d8a70233537c054bf.slice. Oct 2 20:37:51.585787 systemd[1]: Created slice kubepods-burstable-pod8ae2b683df81fcee40a220444e7b529b.slice. Oct 2 20:37:51.589428 systemd[1]: Created slice kubepods-burstable-poda813f6adf5d3baeb29bae4be7076ba29.slice. Oct 2 20:37:51.590330 kubelet[2132]: I1002 20:37:51.590311 2132 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.591000 kubelet[2132]: E1002 20:37:51.590986 2132 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651577 kubelet[2132]: I1002 20:37:51.651538 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651577 kubelet[2132]: I1002 20:37:51.651589 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651748 kubelet[2132]: I1002 20:37:51.651625 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8ae2b683df81fcee40a220444e7b529b-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-855b1f86a1\" (UID: \"8ae2b683df81fcee40a220444e7b529b\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651748 kubelet[2132]: I1002 20:37:51.651645 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651748 kubelet[2132]: I1002 20:37:51.651665 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651748 kubelet[2132]: I1002 20:37:51.651687 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651748 kubelet[2132]: I1002 20:37:51.651705 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651860 kubelet[2132]: I1002 20:37:51.651724 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.651949 kubelet[2132]: I1002 20:37:51.651926 2132 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.853044 kubelet[2132]: E1002 20:37:51.852944 2132 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:51.884209 env[1350]: time="2023-10-02T20:37:51.884168388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-855b1f86a1,Uid:4f2982729002ad4d8a70233537c054bf,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:51.888413 env[1350]: time="2023-10-02T20:37:51.888181235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-855b1f86a1,Uid:8ae2b683df81fcee40a220444e7b529b,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:51.893603 env[1350]: time="2023-10-02T20:37:51.893560604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-855b1f86a1,Uid:a813f6adf5d3baeb29bae4be7076ba29,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:51.992782 kubelet[2132]: I1002 20:37:51.992753 2132 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:51.993033 kubelet[2132]: E1002 20:37:51.993016 2132 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:52.473378 kubelet[2132]: W1002 20:37:52.473326 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.473378 kubelet[2132]: E1002 20:37:52.473380 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.495900 kubelet[2132]: W1002 20:37:52.495848 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-855b1f86a1&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.495999 kubelet[2132]: E1002 20:37:52.495908 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-855b1f86a1&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.525400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745048026.mount: Deactivated successfully. Oct 2 20:37:52.551046 env[1350]: time="2023-10-02T20:37:52.550996031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.554407 env[1350]: time="2023-10-02T20:37:52.554371037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.562134 env[1350]: time="2023-10-02T20:37:52.562103210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.565272 env[1350]: time="2023-10-02T20:37:52.565233736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.567871 env[1350]: time="2023-10-02T20:37:52.567844780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.572664 env[1350]: time="2023-10-02T20:37:52.572633748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.576210 env[1350]: time="2023-10-02T20:37:52.576183875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.579174 env[1350]: time="2023-10-02T20:37:52.579138400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.588278 env[1350]: time="2023-10-02T20:37:52.588239016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.590691 env[1350]: time="2023-10-02T20:37:52.590667660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.597440 env[1350]: time="2023-10-02T20:37:52.597401431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.620397 env[1350]: time="2023-10-02T20:37:52.620364351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:52.641946 env[1350]: time="2023-10-02T20:37:52.641878189Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:52.642117 env[1350]: time="2023-10-02T20:37:52.642094429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:52.642218 env[1350]: time="2023-10-02T20:37:52.642197189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:52.642675 env[1350]: time="2023-10-02T20:37:52.642621590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:52.642791 env[1350]: time="2023-10-02T20:37:52.642769070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:52.642884 env[1350]: time="2023-10-02T20:37:52.642864030Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:52.643173 env[1350]: time="2023-10-02T20:37:52.643140831Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8acaa32160a2f7df2ffe460058f2582210325bc7a35301c061d455a86e0c931b pid=2212 runtime=io.containerd.runc.v2 Oct 2 20:37:52.644313 env[1350]: time="2023-10-02T20:37:52.644275593Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c pid=2216 runtime=io.containerd.runc.v2 Oct 2 20:37:52.653968 kubelet[2132]: E1002 20:37:52.653930 2132 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.665525 systemd[1]: Started cri-containerd-8acaa32160a2f7df2ffe460058f2582210325bc7a35301c061d455a86e0c931b.scope. Oct 2 20:37:52.671326 systemd[1]: Started cri-containerd-a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c.scope. Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.690000 audit: BPF prog-id=65 op=LOAD Oct 2 20:37:52.692000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.692000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636161333231363061326637646632666665343630303538663235 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636161333231363061326637646632666665343630303538663235 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit: BPF prog-id=66 op=LOAD Oct 2 20:37:52.696000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636161333231363061326637646632666665343630303538663235 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit: BPF prog-id=67 op=LOAD Oct 2 20:37:52.696000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636161333231363061326637646632666665343630303538663235 Oct 2 20:37:52.696000 audit: BPF prog-id=67 op=UNLOAD Oct 2 20:37:52.696000 audit: BPF prog-id=66 op=UNLOAD Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.696000 audit: BPF prog-id=68 op=LOAD Oct 2 20:37:52.696000 audit[2232]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636161333231363061326637646632666665343630303538663235 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit: BPF prog-id=69 op=LOAD Oct 2 20:37:52.707000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.707000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343635613162376165333433633965373065306462363632653537 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343635613162376165333433633965373065306462363632653537 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit: BPF prog-id=70 op=LOAD Oct 2 20:37:52.708000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343635613162376165333433633965373065306462363632653537 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit: BPF prog-id=71 op=LOAD Oct 2 20:37:52.708000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343635613162376165333433633965373065306462363632653537 Oct 2 20:37:52.708000 audit: BPF prog-id=71 op=UNLOAD Oct 2 20:37:52.708000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.708000 audit: BPF prog-id=72 op=LOAD Oct 2 20:37:52.708000 audit[2238]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2216 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343635613162376165333433633965373065306462363632653537 Oct 2 20:37:52.720065 env[1350]: time="2023-10-02T20:37:52.719989684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:52.720065 env[1350]: time="2023-10-02T20:37:52.720029244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:52.720065 env[1350]: time="2023-10-02T20:37:52.720038924Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:52.720325 env[1350]: time="2023-10-02T20:37:52.720288725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e pid=2277 runtime=io.containerd.runc.v2 Oct 2 20:37:52.734395 env[1350]: time="2023-10-02T20:37:52.732019705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-855b1f86a1,Uid:4f2982729002ad4d8a70233537c054bf,Namespace:kube-system,Attempt:0,} returns sandbox id \"8acaa32160a2f7df2ffe460058f2582210325bc7a35301c061d455a86e0c931b\"" Oct 2 20:37:52.738206 env[1350]: time="2023-10-02T20:37:52.738173636Z" level=info msg="CreateContainer within sandbox \"8acaa32160a2f7df2ffe460058f2582210325bc7a35301c061d455a86e0c931b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 20:37:52.742649 env[1350]: time="2023-10-02T20:37:52.742611484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-855b1f86a1,Uid:8ae2b683df81fcee40a220444e7b529b,Namespace:kube-system,Attempt:0,} returns sandbox id \"a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c\"" Oct 2 20:37:52.745620 env[1350]: time="2023-10-02T20:37:52.745561409Z" level=info msg="CreateContainer within sandbox \"a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 20:37:52.753078 systemd[1]: Started cri-containerd-5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e.scope. Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.774000 audit: BPF prog-id=73 op=LOAD Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2277 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363964323131373364623530633263343364636337313364396361 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2277 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363964323131373364623530633263343364636337313364396361 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit: BPF prog-id=74 op=LOAD Oct 2 20:37:52.775000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2277 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363964323131373364623530633263343364636337313364396361 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit: BPF prog-id=75 op=LOAD Oct 2 20:37:52.775000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2277 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363964323131373364623530633263343364636337313364396361 Oct 2 20:37:52.775000 audit: BPF prog-id=75 op=UNLOAD Oct 2 20:37:52.775000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.775000 audit: BPF prog-id=76 op=LOAD Oct 2 20:37:52.775000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2277 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536363964323131373364623530633263343364636337313364396361 Oct 2 20:37:52.795942 kubelet[2132]: W1002 20:37:52.795845 2132 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.795942 kubelet[2132]: E1002 20:37:52.795901 2132 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Oct 2 20:37:52.800462 kubelet[2132]: I1002 20:37:52.800113 2132 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:52.800462 kubelet[2132]: E1002 20:37:52.800443 2132 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:52.800895 env[1350]: time="2023-10-02T20:37:52.800844745Z" level=info msg="CreateContainer within sandbox \"8acaa32160a2f7df2ffe460058f2582210325bc7a35301c061d455a86e0c931b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0bc3f93a3b25f3b41d21690f4c77e737f0eb92d3435b23bc7d6f54c8f50e21b5\"" Oct 2 20:37:52.801776 env[1350]: time="2023-10-02T20:37:52.801746506Z" level=info msg="StartContainer for \"0bc3f93a3b25f3b41d21690f4c77e737f0eb92d3435b23bc7d6f54c8f50e21b5\"" Oct 2 20:37:52.811156 env[1350]: time="2023-10-02T20:37:52.811117203Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-855b1f86a1,Uid:a813f6adf5d3baeb29bae4be7076ba29,Namespace:kube-system,Attempt:0,} returns sandbox id \"5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e\"" Oct 2 20:37:52.815242 env[1350]: time="2023-10-02T20:37:52.815211090Z" level=info msg="CreateContainer within sandbox \"5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 20:37:52.817177 env[1350]: time="2023-10-02T20:37:52.817137253Z" level=info msg="CreateContainer within sandbox \"a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610\"" Oct 2 20:37:52.817572 env[1350]: time="2023-10-02T20:37:52.817533894Z" level=info msg="StartContainer for \"15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610\"" Oct 2 20:37:52.827643 systemd[1]: Started cri-containerd-0bc3f93a3b25f3b41d21690f4c77e737f0eb92d3435b23bc7d6f54c8f50e21b5.scope. Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.845000 audit: BPF prog-id=77 op=LOAD Oct 2 20:37:52.845000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.845000 audit[2333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633366393361336232356633623431643231363930663463373765 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633366393361336232356633623431643231363930663463373765 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.846000 audit: BPF prog-id=78 op=LOAD Oct 2 20:37:52.846000 audit[2333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633366393361336232356633623431643231363930663463373765 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit: BPF prog-id=79 op=LOAD Oct 2 20:37:52.847000 audit[2333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633366393361336232356633623431643231363930663463373765 Oct 2 20:37:52.847000 audit: BPF prog-id=79 op=UNLOAD Oct 2 20:37:52.847000 audit: BPF prog-id=78 op=UNLOAD Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.847000 audit: BPF prog-id=80 op=LOAD Oct 2 20:37:52.847000 audit[2333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2212 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633366393361336232356633623431643231363930663463373765 Oct 2 20:37:52.851596 systemd[1]: Started cri-containerd-15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610.scope. Oct 2 20:37:52.853180 env[1350]: time="2023-10-02T20:37:52.853136036Z" level=info msg="CreateContainer within sandbox \"5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31\"" Oct 2 20:37:52.853759 env[1350]: time="2023-10-02T20:37:52.853727717Z" level=info msg="StartContainer for \"24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31\"" Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.888000 audit: BPF prog-id=81 op=LOAD Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.893013 env[1350]: time="2023-10-02T20:37:52.892974185Z" level=info msg="StartContainer for \"0bc3f93a3b25f3b41d21690f4c77e737f0eb92d3435b23bc7d6f54c8f50e21b5\" returns successfully" Oct 2 20:37:52.892000 audit[2352]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2216 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135616462363962626238336530363732343462386262313866303964 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2216 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135616462363962626238336530363732343462386262313866303964 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit: BPF prog-id=82 op=LOAD Oct 2 20:37:52.892000 audit[2352]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2216 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135616462363962626238336530363732343462386262313866303964 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit: BPF prog-id=83 op=LOAD Oct 2 20:37:52.892000 audit[2352]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2216 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135616462363962626238336530363732343462386262313866303964 Oct 2 20:37:52.892000 audit: BPF prog-id=83 op=UNLOAD Oct 2 20:37:52.892000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.892000 audit: BPF prog-id=84 op=LOAD Oct 2 20:37:52.892000 audit[2352]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2216 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135616462363962626238336530363732343462386262313866303964 Oct 2 20:37:52.906531 systemd[1]: Started cri-containerd-24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31.scope. Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.938000 audit: BPF prog-id=85 op=LOAD Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2277 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633131646362653363633961666265373266623438333163353962 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2277 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633131646362653363633961666265373266623438333163353962 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit: BPF prog-id=86 op=LOAD Oct 2 20:37:52.939000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2277 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633131646362653363633961666265373266623438333163353962 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit: BPF prog-id=87 op=LOAD Oct 2 20:37:52.939000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2277 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633131646362653363633961666265373266623438333163353962 Oct 2 20:37:52.939000 audit: BPF prog-id=87 op=UNLOAD Oct 2 20:37:52.939000 audit: BPF prog-id=86 op=UNLOAD Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:52.939000 audit: BPF prog-id=88 op=LOAD Oct 2 20:37:52.939000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2277 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234633131646362653363633961666265373266623438333163353962 Oct 2 20:37:52.964755 env[1350]: time="2023-10-02T20:37:52.964709349Z" level=info msg="StartContainer for \"15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610\" returns successfully" Oct 2 20:37:52.974519 env[1350]: time="2023-10-02T20:37:52.974468446Z" level=info msg="StartContainer for \"24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31\" returns successfully" Oct 2 20:37:54.402376 kubelet[2132]: I1002 20:37:54.402348 2132 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:55.379000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.384416 kernel: kauditd_printk_skb: 622 callbacks suppressed Oct 2 20:37:55.384517 kernel: audit: type=1400 audit(1696279075.379:712): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.404000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.437587 kernel: audit: type=1400 audit(1696279075.404:713): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.404000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40027321b0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.472954 kernel: audit: type=1300 audit(1696279075.404:713): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40027321b0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.473072 kernel: audit: type=1327 audit(1696279075.404:713): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.404000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.404000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.515957 kernel: audit: type=1400 audit(1696279075.404:714): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.516078 kernel: audit: type=1300 audit(1696279075.404:714): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40024a9f00 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.404000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40024a9f00 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.404000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.565322 kernel: audit: type=1327 audit(1696279075.404:714): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.565441 kernel: audit: type=1300 audit(1696279075.379:712): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40012ce000 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:37:55.379000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40012ce000 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:37:55.379000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:55.616204 kernel: audit: type=1327 audit(1696279075.379:712): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:55.405000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.642515 kernel: audit: type=1400 audit(1696279075.405:715): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.405000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40012c4040 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:37:55.405000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:55.406000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.406000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002732510 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.415000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.415000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=40026519e0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.421000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.421000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=400199c680 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.421000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:55.421000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=56 a1=4002f30d20 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:37:55.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:55.753089 kubelet[2132]: E1002 20:37:55.753055 2132 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-855b1f86a1\" not found" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:55.767389 kubelet[2132]: I1002 20:37:55.767357 2132 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:56.245704 kubelet[2132]: I1002 20:37:56.245670 2132 apiserver.go:52] "Watching apiserver" Oct 2 20:37:56.250735 kubelet[2132]: I1002 20:37:56.250710 2132 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 20:37:56.274524 kubelet[2132]: I1002 20:37:56.274488 2132 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:37:58.084924 systemd[1]: Reloading. Oct 2 20:37:58.148374 /usr/lib/systemd/system-generators/torcx-generator[2460]: time="2023-10-02T20:37:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:58.148403 /usr/lib/systemd/system-generators/torcx-generator[2460]: time="2023-10-02T20:37:58Z" level=info msg="torcx already run" Oct 2 20:37:58.285475 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:58.285675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:58.305319 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:58.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.390000 audit: BPF prog-id=89 op=LOAD Oct 2 20:37:58.390000 audit: BPF prog-id=65 op=UNLOAD Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.391000 audit: BPF prog-id=90 op=LOAD Oct 2 20:37:58.391000 audit: BPF prog-id=50 op=UNLOAD Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.392000 audit: BPF prog-id=91 op=LOAD Oct 2 20:37:58.392000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.393000 audit: BPF prog-id=92 op=LOAD Oct 2 20:37:58.394000 audit: BPF prog-id=51 op=UNLOAD Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.395000 audit: BPF prog-id=93 op=LOAD Oct 2 20:37:58.395000 audit: BPF prog-id=52 op=UNLOAD Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.396000 audit: BPF prog-id=94 op=LOAD Oct 2 20:37:58.396000 audit: BPF prog-id=85 op=UNLOAD Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.397000 audit: BPF prog-id=95 op=LOAD Oct 2 20:37:58.397000 audit: BPF prog-id=81 op=UNLOAD Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.398000 audit: BPF prog-id=96 op=LOAD Oct 2 20:37:58.398000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.399000 audit: BPF prog-id=97 op=LOAD Oct 2 20:37:58.399000 audit: BPF prog-id=53 op=UNLOAD Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit: BPF prog-id=98 op=LOAD Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.401000 audit: BPF prog-id=99 op=LOAD Oct 2 20:37:58.402000 audit: BPF prog-id=54 op=UNLOAD Oct 2 20:37:58.402000 audit: BPF prog-id=55 op=UNLOAD Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit: BPF prog-id=100 op=LOAD Oct 2 20:37:58.403000 audit: BPF prog-id=56 op=UNLOAD Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit: BPF prog-id=101 op=LOAD Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.404000 audit: BPF prog-id=102 op=LOAD Oct 2 20:37:58.404000 audit: BPF prog-id=57 op=UNLOAD Oct 2 20:37:58.404000 audit: BPF prog-id=58 op=UNLOAD Oct 2 20:37:58.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.406000 audit: BPF prog-id=103 op=LOAD Oct 2 20:37:58.406000 audit: BPF prog-id=59 op=UNLOAD Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit: BPF prog-id=104 op=LOAD Oct 2 20:37:58.407000 audit: BPF prog-id=60 op=UNLOAD Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit: BPF prog-id=105 op=LOAD Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.407000 audit: BPF prog-id=106 op=LOAD Oct 2 20:37:58.407000 audit: BPF prog-id=61 op=UNLOAD Oct 2 20:37:58.407000 audit: BPF prog-id=62 op=UNLOAD Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit: BPF prog-id=107 op=LOAD Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.409000 audit: BPF prog-id=108 op=LOAD Oct 2 20:37:58.409000 audit: BPF prog-id=63 op=UNLOAD Oct 2 20:37:58.409000 audit: BPF prog-id=64 op=UNLOAD Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.410000 audit: BPF prog-id=109 op=LOAD Oct 2 20:37:58.410000 audit: BPF prog-id=69 op=UNLOAD Oct 2 20:37:58.430557 systemd[1]: Stopping kubelet.service... Oct 2 20:37:58.452975 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 20:37:58.453172 systemd[1]: Stopped kubelet.service. Oct 2 20:37:58.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:58.453225 systemd[1]: kubelet.service: Consumed 2.047s CPU time. Oct 2 20:37:58.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:58.454981 systemd[1]: Started kubelet.service. Oct 2 20:37:58.542779 kubelet[2520]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:58.542779 kubelet[2520]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:58.543078 kubelet[2520]: I1002 20:37:58.542894 2520 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:58.549001 kubelet[2520]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:58.549001 kubelet[2520]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:58.554164 kubelet[2520]: I1002 20:37:58.554142 2520 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 20:37:58.554276 kubelet[2520]: I1002 20:37:58.554267 2520 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:58.554602 kubelet[2520]: I1002 20:37:58.554589 2520 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 20:37:58.556014 kubelet[2520]: I1002 20:37:58.555999 2520 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 20:37:58.557404 kubelet[2520]: I1002 20:37:58.557371 2520 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:58.559938 kubelet[2520]: W1002 20:37:58.559923 2520 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:58.560850 kubelet[2520]: I1002 20:37:58.560835 2520 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:58.561175 kubelet[2520]: I1002 20:37:58.561163 2520 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:58.561312 kubelet[2520]: I1002 20:37:58.561301 2520 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:37:58.561479 kubelet[2520]: I1002 20:37:58.561467 2520 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:58.561545 kubelet[2520]: I1002 20:37:58.561536 2520 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 20:37:58.561670 kubelet[2520]: I1002 20:37:58.561659 2520 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:58.565083 kubelet[2520]: I1002 20:37:58.565057 2520 kubelet.go:398] "Attempting to sync node with API server" Oct 2 20:37:58.565083 kubelet[2520]: I1002 20:37:58.565084 2520 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:58.565184 kubelet[2520]: I1002 20:37:58.565148 2520 kubelet.go:297] "Adding apiserver pod source" Oct 2 20:37:58.565184 kubelet[2520]: I1002 20:37:58.565158 2520 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:58.565741 kubelet[2520]: I1002 20:37:58.565718 2520 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:58.566797 kubelet[2520]: I1002 20:37:58.566771 2520 server.go:1186] "Started kubelet" Oct 2 20:37:58.568000 audit[2520]: AVC avc: denied { mac_admin } for pid=2520 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.568000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:58.568000 audit[2520]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ba8e40 a1=4000bd04c8 a2=4000ba8e10 a3=25 items=0 ppid=1 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:58.568000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:58.568000 audit[2520]: AVC avc: denied { mac_admin } for pid=2520 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.568000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:58.568000 audit[2520]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c7300 a1=4000bd04e0 a2=4000ba8ed0 a3=25 items=0 ppid=1 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:58.568000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:58.569089 kubelet[2520]: I1002 20:37:58.568846 2520 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:58.569089 kubelet[2520]: I1002 20:37:58.568888 2520 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:58.569089 kubelet[2520]: I1002 20:37:58.568906 2520 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:58.569332 kubelet[2520]: I1002 20:37:58.569311 2520 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:58.570093 kubelet[2520]: I1002 20:37:58.570078 2520 server.go:451] "Adding debug handlers to kubelet server" Oct 2 20:37:58.572650 kubelet[2520]: I1002 20:37:58.572633 2520 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 20:37:58.573343 kubelet[2520]: I1002 20:37:58.573320 2520 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 20:37:58.579600 kubelet[2520]: E1002 20:37:58.575766 2520 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:58.579600 kubelet[2520]: E1002 20:37:58.575792 2520 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:58.689213 kubelet[2520]: I1002 20:37:58.689177 2520 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.694750 kubelet[2520]: I1002 20:37:58.694726 2520 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:37:58.694750 kubelet[2520]: I1002 20:37:58.694745 2520 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:58.694870 kubelet[2520]: I1002 20:37:58.694773 2520 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:58.694951 kubelet[2520]: I1002 20:37:58.694932 2520 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 20:37:58.694951 kubelet[2520]: I1002 20:37:58.694951 2520 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 20:37:58.695069 kubelet[2520]: I1002 20:37:58.694958 2520 policy_none.go:49] "None policy: Start" Oct 2 20:37:58.695669 kubelet[2520]: I1002 20:37:58.695642 2520 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:37:58.695669 kubelet[2520]: I1002 20:37:58.695672 2520 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:58.695807 kubelet[2520]: I1002 20:37:58.695787 2520 state_mem.go:75] "Updated machine memory state" Oct 2 20:37:58.701890 kubelet[2520]: I1002 20:37:58.701868 2520 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:58.701000 audit[2520]: AVC avc: denied { mac_admin } for pid=2520 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:58.701000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:58.701000 audit[2520]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40013a4390 a1=40013a6330 a2=40013a4360 a3=25 items=0 ppid=1 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:58.701000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:58.702117 kubelet[2520]: I1002 20:37:58.701944 2520 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:58.702117 kubelet[2520]: I1002 20:37:58.702108 2520 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:58.711677 kubelet[2520]: I1002 20:37:58.711652 2520 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.711754 kubelet[2520]: I1002 20:37:58.711735 2520 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.724972 kubelet[2520]: I1002 20:37:58.724951 2520 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:58.754959 kubelet[2520]: I1002 20:37:58.754929 2520 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:58.754959 kubelet[2520]: I1002 20:37:58.754954 2520 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 20:37:58.755126 kubelet[2520]: I1002 20:37:58.754970 2520 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 20:37:58.755126 kubelet[2520]: E1002 20:37:58.755013 2520 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 20:37:58.855527 kubelet[2520]: I1002 20:37:58.855496 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:58.855683 kubelet[2520]: I1002 20:37:58.855641 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:58.855683 kubelet[2520]: I1002 20:37:58.855677 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:37:58.866766 kubelet[2520]: E1002 20:37:58.866741 2520 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.866986 kubelet[2520]: E1002 20:37:58.866775 2520 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877554 kubelet[2520]: I1002 20:37:58.877510 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877554 kubelet[2520]: I1002 20:37:58.877561 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877697 kubelet[2520]: I1002 20:37:58.877612 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877697 kubelet[2520]: I1002 20:37:58.877633 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877697 kubelet[2520]: I1002 20:37:58.877661 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877697 kubelet[2520]: I1002 20:37:58.877683 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a813f6adf5d3baeb29bae4be7076ba29-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" (UID: \"a813f6adf5d3baeb29bae4be7076ba29\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877791 kubelet[2520]: I1002 20:37:58.877702 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8ae2b683df81fcee40a220444e7b529b-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-855b1f86a1\" (UID: \"8ae2b683df81fcee40a220444e7b529b\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877791 kubelet[2520]: I1002 20:37:58.877723 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:58.877791 kubelet[2520]: I1002 20:37:58.877746 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2982729002ad4d8a70233537c054bf-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-855b1f86a1\" (UID: \"4f2982729002ad4d8a70233537c054bf\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" Oct 2 20:37:59.575126 kubelet[2520]: I1002 20:37:59.575094 2520 apiserver.go:52] "Watching apiserver" Oct 2 20:37:59.673937 kubelet[2520]: I1002 20:37:59.673905 2520 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 20:37:59.682327 kubelet[2520]: I1002 20:37:59.682296 2520 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:38:00.008840 kubelet[2520]: E1002 20:38:00.008787 2520 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-855b1f86a1\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:00.573142 kubelet[2520]: I1002 20:38:00.573101 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-855b1f86a1" podStartSLOduration=3.573014678 pod.CreationTimestamp="2023-10-02 20:37:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:00.572277037 +0000 UTC m=+2.104989169" watchObservedRunningTime="2023-10-02 20:38:00.573014678 +0000 UTC m=+2.105726810" Oct 2 20:38:00.573313 kubelet[2520]: I1002 20:38:00.573226 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-855b1f86a1" podStartSLOduration=2.573209758 pod.CreationTimestamp="2023-10-02 20:37:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:00.276050692 +0000 UTC m=+1.808762784" watchObservedRunningTime="2023-10-02 20:38:00.573209758 +0000 UTC m=+2.105921890" Oct 2 20:38:00.972155 kubelet[2520]: I1002 20:38:00.972123 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-855b1f86a1" podStartSLOduration=3.97208485 pod.CreationTimestamp="2023-10-02 20:37:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:00.971336529 +0000 UTC m=+2.504048661" watchObservedRunningTime="2023-10-02 20:38:00.97208485 +0000 UTC m=+2.504796982" Oct 2 20:38:03.671160 sudo[1725]: pam_unix(sudo:session): session closed for user root Oct 2 20:38:03.670000 audit[1725]: USER_END pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.677349 kernel: kauditd_printk_skb: 272 callbacks suppressed Oct 2 20:38:03.677505 kernel: audit: type=1106 audit(1696279083.670:969): pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.670000 audit[1725]: CRED_DISP pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.717788 kernel: audit: type=1104 audit(1696279083.670:970): pid=1725 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.743362 sshd[1722]: pam_unix(sshd:session): session closed for user core Oct 2 20:38:03.743000 audit[1722]: USER_END pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:03.744000 audit[1722]: CRED_DISP pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:03.772518 kernel: audit: type=1106 audit(1696279083.743:971): pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:03.772601 kernel: audit: type=1104 audit(1696279083.744:972): pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:03.771353 systemd[1]: sshd@6-10.200.20.39:22-10.200.12.6:44630.service: Deactivated successfully. Oct 2 20:38:03.772131 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:38:03.772306 systemd[1]: session-9.scope: Consumed 5.106s CPU time. Oct 2 20:38:03.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.812250 kernel: audit: type=1131 audit(1696279083.770:973): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:44630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:03.811726 systemd-logind[1339]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:38:03.813131 systemd-logind[1339]: Removed session 9. Oct 2 20:38:10.758000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.758000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010d6240 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.810252 kernel: audit: type=1400 audit(1696279090.758:974): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.810394 kernel: audit: type=1300 audit(1696279090.758:974): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010d6240 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.834140 kernel: audit: type=1327 audit(1696279090.758:974): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.762000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.856055 kernel: audit: type=1400 audit(1696279090.762:975): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.762000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d6380 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.885479 kernel: audit: type=1300 audit(1696279090.762:975): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d6380 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.885598 kernel: audit: type=1327 audit(1696279090.762:975): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.930252 kernel: audit: type=1400 audit(1696279090.764:976): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.764000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d64c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.959363 kernel: audit: type=1300 audit(1696279090.764:976): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d64c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.983352 kernel: audit: type=1327 audit(1696279090.764:976): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.983510 kernel: audit: type=1400 audit(1696279090.765:977): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:10.765000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400134e340 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:10.765000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:12.905000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 20:38:12.905000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400153c5c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:12.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:13.182832 kubelet[2520]: I1002 20:38:13.182804 2520 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 20:38:13.183206 env[1350]: time="2023-10-02T20:38:13.183159368Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:38:13.183553 kubelet[2520]: I1002 20:38:13.183534 2520 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 20:38:13.873508 kubelet[2520]: I1002 20:38:13.873472 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:13.878452 systemd[1]: Created slice kubepods-besteffort-pod767be081_283a_4720_8f7d_14b4723ee5f2.slice. Oct 2 20:38:13.946674 kubelet[2520]: I1002 20:38:13.946571 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/767be081-283a-4720-8f7d-14b4723ee5f2-kube-proxy\") pod \"kube-proxy-49hz9\" (UID: \"767be081-283a-4720-8f7d-14b4723ee5f2\") " pod="kube-system/kube-proxy-49hz9" Oct 2 20:38:13.946884 kubelet[2520]: I1002 20:38:13.946872 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/767be081-283a-4720-8f7d-14b4723ee5f2-xtables-lock\") pod \"kube-proxy-49hz9\" (UID: \"767be081-283a-4720-8f7d-14b4723ee5f2\") " pod="kube-system/kube-proxy-49hz9" Oct 2 20:38:13.946977 kubelet[2520]: I1002 20:38:13.946967 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/767be081-283a-4720-8f7d-14b4723ee5f2-lib-modules\") pod \"kube-proxy-49hz9\" (UID: \"767be081-283a-4720-8f7d-14b4723ee5f2\") " pod="kube-system/kube-proxy-49hz9" Oct 2 20:38:13.947072 kubelet[2520]: I1002 20:38:13.947063 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crmtn\" (UniqueName: \"kubernetes.io/projected/767be081-283a-4720-8f7d-14b4723ee5f2-kube-api-access-crmtn\") pod \"kube-proxy-49hz9\" (UID: \"767be081-283a-4720-8f7d-14b4723ee5f2\") " pod="kube-system/kube-proxy-49hz9" Oct 2 20:38:14.172654 kubelet[2520]: I1002 20:38:14.172615 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:14.177570 systemd[1]: Created slice kubepods-besteffort-podc70c6c9e_616f_4efd_9045_744fecd6e3eb.slice. Oct 2 20:38:14.188078 env[1350]: time="2023-10-02T20:38:14.187630768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-49hz9,Uid:767be081-283a-4720-8f7d-14b4723ee5f2,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:14.222513 env[1350]: time="2023-10-02T20:38:14.222456725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:14.222749 env[1350]: time="2023-10-02T20:38:14.222704806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:14.222852 env[1350]: time="2023-10-02T20:38:14.222830646Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:14.223863 env[1350]: time="2023-10-02T20:38:14.223806287Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef pid=2623 runtime=io.containerd.runc.v2 Oct 2 20:38:14.240207 systemd[1]: Started cri-containerd-fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef.scope. Oct 2 20:38:14.245238 systemd[1]: run-containerd-runc-k8s.io-fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef-runc.nSEive.mount: Deactivated successfully. Oct 2 20:38:14.249284 kubelet[2520]: I1002 20:38:14.249188 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wmp5p\" (UniqueName: \"kubernetes.io/projected/c70c6c9e-616f-4efd-9045-744fecd6e3eb-kube-api-access-wmp5p\") pod \"tigera-operator-54b47459dd-ph2l7\" (UID: \"c70c6c9e-616f-4efd-9045-744fecd6e3eb\") " pod="tigera-operator/tigera-operator-54b47459dd-ph2l7" Oct 2 20:38:14.249284 kubelet[2520]: I1002 20:38:14.249228 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c70c6c9e-616f-4efd-9045-744fecd6e3eb-var-lib-calico\") pod \"tigera-operator-54b47459dd-ph2l7\" (UID: \"c70c6c9e-616f-4efd-9045-744fecd6e3eb\") " pod="tigera-operator/tigera-operator-54b47459dd-ph2l7" Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit: BPF prog-id=110 op=LOAD Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=2623 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313131383735623939396238346165646331363130346465306138 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=2623 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313131383735623939396238346165646331363130346465306138 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit: BPF prog-id=111 op=LOAD Oct 2 20:38:14.262000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=2623 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313131383735623939396238346165646331363130346465306138 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit: BPF prog-id=112 op=LOAD Oct 2 20:38:14.262000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=2623 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313131383735623939396238346165646331363130346465306138 Oct 2 20:38:14.262000 audit: BPF prog-id=112 op=UNLOAD Oct 2 20:38:14.262000 audit: BPF prog-id=111 op=UNLOAD Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.262000 audit: BPF prog-id=113 op=LOAD Oct 2 20:38:14.262000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=2623 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313131383735623939396238346165646331363130346465306138 Oct 2 20:38:14.277567 env[1350]: time="2023-10-02T20:38:14.277527343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-49hz9,Uid:767be081-283a-4720-8f7d-14b4723ee5f2,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef\"" Oct 2 20:38:14.282316 env[1350]: time="2023-10-02T20:38:14.282275269Z" level=info msg="CreateContainer within sandbox \"fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:38:14.311989 env[1350]: time="2023-10-02T20:38:14.311946580Z" level=info msg="CreateContainer within sandbox \"fc111875b999b84aedc16104de0a8a598d40f4311e9c0c5579bc7bea61b741ef\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2bef06a2c04b7e86418cac203ee881d0ef18f89c700b3dfb976c54a4fa3580be\"" Oct 2 20:38:14.312958 env[1350]: time="2023-10-02T20:38:14.312930221Z" level=info msg="StartContainer for \"2bef06a2c04b7e86418cac203ee881d0ef18f89c700b3dfb976c54a4fa3580be\"" Oct 2 20:38:14.334607 systemd[1]: Started cri-containerd-2bef06a2c04b7e86418cac203ee881d0ef18f89c700b3dfb976c54a4fa3580be.scope. Oct 2 20:38:14.364000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.364000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656630366132633034623765383634313863616332303365653838 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.365000 audit: BPF prog-id=114 op=LOAD Oct 2 20:38:14.365000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656630366132633034623765383634313863616332303365653838 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit: BPF prog-id=115 op=LOAD Oct 2 20:38:14.366000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656630366132633034623765383634313863616332303365653838 Oct 2 20:38:14.366000 audit: BPF prog-id=115 op=UNLOAD Oct 2 20:38:14.366000 audit: BPF prog-id=114 op=UNLOAD Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.366000 audit: BPF prog-id=116 op=LOAD Oct 2 20:38:14.366000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262656630366132633034623765383634313863616332303365653838 Oct 2 20:38:14.385770 env[1350]: time="2023-10-02T20:38:14.385721778Z" level=info msg="StartContainer for \"2bef06a2c04b7e86418cac203ee881d0ef18f89c700b3dfb976c54a4fa3580be\" returns successfully" Oct 2 20:38:14.450000 audit[2716]: NETFILTER_CFG table=mangle:62 family=2 entries=1 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.450000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe92be930 a2=0 a3=ffff8dee96c0 items=0 ppid=2675 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:14.454000 audit[2717]: NETFILTER_CFG table=mangle:63 family=10 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.454000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffceaf7a10 a2=0 a3=ffff99aac6c0 items=0 ppid=2675 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:14.455000 audit[2718]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.455000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8e43060 a2=0 a3=ffff9bc236c0 items=0 ppid=2675 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:14.457000 audit[2720]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.457000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff64f1f0 a2=0 a3=ffffb2b0a6c0 items=0 ppid=2675 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:14.458000 audit[2719]: NETFILTER_CFG table=nat:66 family=10 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.458000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe26c68c0 a2=0 a3=ffffa457b6c0 items=0 ppid=2675 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:14.460000 audit[2721]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.460000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0d3d510 a2=0 a3=ffffab4186c0 items=0 ppid=2675 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:14.480008 env[1350]: time="2023-10-02T20:38:14.479967638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-ph2l7,Uid:c70c6c9e-616f-4efd-9045-744fecd6e3eb,Namespace:tigera-operator,Attempt:0,}" Oct 2 20:38:14.511076 env[1350]: time="2023-10-02T20:38:14.510957790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:14.511076 env[1350]: time="2023-10-02T20:38:14.511020190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:14.511323 env[1350]: time="2023-10-02T20:38:14.511030910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:14.511392 env[1350]: time="2023-10-02T20:38:14.511374511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8 pid=2730 runtime=io.containerd.runc.v2 Oct 2 20:38:14.527711 systemd[1]: Started cri-containerd-4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8.scope. Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.543000 audit: BPF prog-id=117 op=LOAD Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2730 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366232643965666234613231653136313639303333396638346634 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2730 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366232643965666234613231653136313639303333396638346634 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit: BPF prog-id=118 op=LOAD Oct 2 20:38:14.544000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2730 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366232643965666234613231653136313639303333396638346634 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit: BPF prog-id=119 op=LOAD Oct 2 20:38:14.544000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2730 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366232643965666234613231653136313639303333396638346634 Oct 2 20:38:14.544000 audit: BPF prog-id=119 op=UNLOAD Oct 2 20:38:14.544000 audit: BPF prog-id=118 op=UNLOAD Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.544000 audit: BPF prog-id=120 op=LOAD Oct 2 20:38:14.544000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2730 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466366232643965666234613231653136313639303333396638346634 Oct 2 20:38:14.549000 audit[2757]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.549000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffef680cf0 a2=0 a3=ffffad4b96c0 items=0 ppid=2675 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:14.556000 audit[2759]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.556000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff00b6150 a2=0 a3=ffff951e46c0 items=0 ppid=2675 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:38:14.563000 audit[2770]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.563000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffcfe10e0 a2=0 a3=ffff98ea36c0 items=0 ppid=2675 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:38:14.565000 audit[2771]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.565000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff925aa20 a2=0 a3=ffff9de936c0 items=0 ppid=2675 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:14.569000 audit[2773]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.569000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffda54ecb0 a2=0 a3=ffffae5f16c0 items=0 ppid=2675 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:14.571877 env[1350]: time="2023-10-02T20:38:14.571832575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-ph2l7,Uid:c70c6c9e-616f-4efd-9045-744fecd6e3eb,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8\"" Oct 2 20:38:14.572000 audit[2774]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.572000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8eab2e0 a2=0 a3=ffffa5a3c6c0 items=0 ppid=2675 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:14.576078 env[1350]: time="2023-10-02T20:38:14.575517659Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 20:38:14.577000 audit[2776]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.577000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffea9289a0 a2=0 a3=ffffadadc6c0 items=0 ppid=2675 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:14.583000 audit[2779]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.583000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc84d9b40 a2=0 a3=ffff9ffb96c0 items=0 ppid=2675 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:38:14.584000 audit[2780]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.584000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc342a6b0 a2=0 a3=ffffa0a456c0 items=0 ppid=2675 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:14.588000 audit[2782]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.588000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1866620 a2=0 a3=ffff90b136c0 items=0 ppid=2675 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:14.589000 audit[2783]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.589000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1a85900 a2=0 a3=ffff840056c0 items=0 ppid=2675 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:14.593000 audit[2785]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.593000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcaa05c10 a2=0 a3=ffff8f7746c0 items=0 ppid=2675 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.605000 audit[2788]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.605000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe371c0e0 a2=0 a3=ffff8b36a6c0 items=0 ppid=2675 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.610000 audit[2791]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.610000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff61686e0 a2=0 a3=ffffbeedf6c0 items=0 ppid=2675 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:14.612000 audit[2792]: NETFILTER_CFG table=nat:82 family=2 entries=1 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.612000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc9d18440 a2=0 a3=ffffb81cf6c0 items=0 ppid=2675 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:14.615000 audit[2794]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.615000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd7d55b30 a2=0 a3=ffff9e7916c0 items=0 ppid=2675 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.620000 audit[2797]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.620000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc1103bf0 a2=0 a3=ffffa5bf66c0 items=0 ppid=2675 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.705000 audit[2801]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:14.705000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffffdd72a70 a2=0 a3=ffff971756c0 items=0 ppid=2675 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.729000 audit[2801]: NETFILTER_CFG table=nat:86 family=2 entries=17 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:14.729000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffffdd72a70 a2=0 a3=ffff971756c0 items=0 ppid=2675 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.735000 audit[2805]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.735000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffdbd3960 a2=0 a3=ffff8a0916c0 items=0 ppid=2675 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:14.739000 audit[2807]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.739000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc0392d30 a2=0 a3=ffff98b266c0 items=0 ppid=2675 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:38:14.745000 audit[2810]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.745000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe028f3a0 a2=0 a3=ffff8f3f26c0 items=0 ppid=2675 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:38:14.746000 audit[2811]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.746000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdef316d0 a2=0 a3=ffffa97986c0 items=0 ppid=2675 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:14.750000 audit[2813]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.750000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd728ce0 a2=0 a3=ffff815496c0 items=0 ppid=2675 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:14.752000 audit[2814]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.752000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe128b080 a2=0 a3=ffffb74556c0 items=0 ppid=2675 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:14.757000 audit[2816]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.757000 audit[2816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdb141db0 a2=0 a3=ffffbef166c0 items=0 ppid=2675 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:38:14.762000 audit[2819]: NETFILTER_CFG table=filter:94 family=10 entries=2 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.762000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd0604ec0 a2=0 a3=ffff8a3f06c0 items=0 ppid=2675 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:14.764000 audit[2820]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.764000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8c87e00 a2=0 a3=ffff91ce76c0 items=0 ppid=2675 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:14.768000 audit[2822]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.768000 audit[2822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd44536c0 a2=0 a3=ffffbe4446c0 items=0 ppid=2675 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:14.769000 audit[2823]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.769000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2449950 a2=0 a3=ffff9d04e6c0 items=0 ppid=2675 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:14.774000 audit[2825]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.774000 audit[2825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe1ee7fe0 a2=0 a3=ffffba2286c0 items=0 ppid=2675 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.780000 audit[2828]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.780000 audit[2828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8f090e0 a2=0 a3=ffff88a106c0 items=0 ppid=2675 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:14.786000 audit[2831]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.786000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff23282e0 a2=0 a3=ffffb81eb6c0 items=0 ppid=2675 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:38:14.792000 audit[2832]: NETFILTER_CFG table=nat:101 family=10 entries=1 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.792000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe98341a0 a2=0 a3=ffff998946c0 items=0 ppid=2675 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:14.802000 audit[2834]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.802000 audit[2834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe5fc96f0 a2=0 a3=ffffa4a326c0 items=0 ppid=2675 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.808000 audit[2837]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.808000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcf5bfd40 a2=0 a3=ffffa953c6c0 items=0 ppid=2675 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.816000 audit[2841]: NETFILTER_CFG table=filter:104 family=10 entries=3 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:14.816000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe0c68f90 a2=0 a3=ffff911256c0 items=0 ppid=2675 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.816000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.816000 audit[2841]: NETFILTER_CFG table=nat:105 family=10 entries=10 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:14.816000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe0c68f90 a2=0 a3=ffff911256c0 items=0 ppid=2675 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.816000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:16.073703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3927836292.mount: Deactivated successfully. Oct 2 20:38:16.782697 env[1350]: time="2023-10-02T20:38:16.782650059Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:16.787644 env[1350]: time="2023-10-02T20:38:16.787606305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:16.793558 env[1350]: time="2023-10-02T20:38:16.793512111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:16.797407 env[1350]: time="2023-10-02T20:38:16.797378234Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:16.798061 env[1350]: time="2023-10-02T20:38:16.798032435Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 20:38:16.800737 env[1350]: time="2023-10-02T20:38:16.800708038Z" level=info msg="CreateContainer within sandbox \"4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 20:38:16.818755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3940766504.mount: Deactivated successfully. Oct 2 20:38:16.823152 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3062158693.mount: Deactivated successfully. Oct 2 20:38:16.832559 env[1350]: time="2023-10-02T20:38:16.832508390Z" level=info msg="CreateContainer within sandbox \"4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5\"" Oct 2 20:38:16.833807 env[1350]: time="2023-10-02T20:38:16.833781311Z" level=info msg="StartContainer for \"38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5\"" Oct 2 20:38:16.854936 systemd[1]: Started cri-containerd-38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5.scope. Oct 2 20:38:16.878953 kernel: kauditd_printk_skb: 294 callbacks suppressed Oct 2 20:38:16.879062 kernel: audit: type=1400 audit(1696279096.872:1065): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912926 kernel: audit: type=1400 audit(1696279096.872:1066): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.929424 kernel: audit: type=1400 audit(1696279096.872:1067): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.946840 kernel: audit: type=1400 audit(1696279096.872:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.963647 kernel: audit: type=1400 audit(1696279096.872:1069): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.982060 kernel: audit: type=1400 audit(1696279096.872:1070): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:17.000222 kernel: audit: type=1400 audit(1696279096.872:1071): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:17.019284 kernel: audit: type=1400 audit(1696279096.872:1072): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:17.037760 kernel: audit: type=1400 audit(1696279096.872:1073): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:17.037971 kernel: audit: type=1400 audit(1696279096.878:1074): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit: BPF prog-id=121 op=LOAD Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:16.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653331303438353364343733666262346461623438663030653363 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:16.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653331303438353364343733666262346461623438663030653363 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.878000 audit: BPF prog-id=122 op=LOAD Oct 2 20:38:16.878000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:16.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653331303438353364343733666262346461623438663030653363 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.895000 audit: BPF prog-id=123 op=LOAD Oct 2 20:38:16.895000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:16.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653331303438353364343733666262346461623438663030653363 Oct 2 20:38:16.912000 audit: BPF prog-id=123 op=UNLOAD Oct 2 20:38:16.912000 audit: BPF prog-id=122 op=UNLOAD Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:16.912000 audit: BPF prog-id=124 op=LOAD Oct 2 20:38:16.912000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2730 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:16.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653331303438353364343733666262346461623438663030653363 Oct 2 20:38:17.061314 env[1350]: time="2023-10-02T20:38:17.061275541Z" level=info msg="StartContainer for \"38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5\" returns successfully" Oct 2 20:38:17.803783 kubelet[2520]: I1002 20:38:17.803742 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-49hz9" podStartSLOduration=4.803708681 pod.CreationTimestamp="2023-10-02 20:38:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:14.798597655 +0000 UTC m=+16.331309787" watchObservedRunningTime="2023-10-02 20:38:17.803708681 +0000 UTC m=+19.336420813" Oct 2 20:38:18.766791 kubelet[2520]: I1002 20:38:18.766757 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-ph2l7" podStartSLOduration=-9.223372032088055e+09 pod.CreationTimestamp="2023-10-02 20:38:14 +0000 UTC" firstStartedPulling="2023-10-02 20:38:14.573839777 +0000 UTC m=+16.106551909" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:17.804888082 +0000 UTC m=+19.337600214" watchObservedRunningTime="2023-10-02 20:38:18.766721506 +0000 UTC m=+20.299433638" Oct 2 20:38:20.502000 audit[2906]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.502000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffff9a77b70 a2=0 a3=ffff991a06c0 items=0 ppid=2675 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.503000 audit[2906]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.503000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff9a77b70 a2=0 a3=ffff991a06c0 items=0 ppid=2675 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.545000 audit[2932]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.545000 audit[2932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffff6fa920 a2=0 a3=ffff906d46c0 items=0 ppid=2675 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.546000 audit[2932]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:20.546000 audit[2932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffff6fa920 a2=0 a3=ffff906d46c0 items=0 ppid=2675 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:20.699012 kubelet[2520]: I1002 20:38:20.698961 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:20.703881 systemd[1]: Created slice kubepods-besteffort-pod91079101_1ec9_4052_80f7_91fd67ae8e61.slice. Oct 2 20:38:20.750550 kubelet[2520]: I1002 20:38:20.750508 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:20.755064 systemd[1]: Created slice kubepods-besteffort-pod752fd7c8_bebf_461c_828e_fce633d5aaff.slice. Oct 2 20:38:20.800303 kubelet[2520]: I1002 20:38:20.800278 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-policysync\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.800517 kubelet[2520]: I1002 20:38:20.800505 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-cni-log-dir\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.800646 kubelet[2520]: I1002 20:38:20.800634 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/752fd7c8-bebf-461c-828e-fce633d5aaff-tigera-ca-bundle\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.800765 kubelet[2520]: I1002 20:38:20.800748 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-var-run-calico\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.800857 kubelet[2520]: I1002 20:38:20.800848 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-cni-net-dir\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.800986 kubelet[2520]: I1002 20:38:20.800961 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-cni-bin-dir\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801032 kubelet[2520]: I1002 20:38:20.801003 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-shj8p\" (UniqueName: \"kubernetes.io/projected/752fd7c8-bebf-461c-828e-fce633d5aaff-kube-api-access-shj8p\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801032 kubelet[2520]: I1002 20:38:20.801026 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kbdlq\" (UniqueName: \"kubernetes.io/projected/91079101-1ec9-4052-80f7-91fd67ae8e61-kube-api-access-kbdlq\") pod \"calico-typha-844b9cbc57-c75mp\" (UID: \"91079101-1ec9-4052-80f7-91fd67ae8e61\") " pod="calico-system/calico-typha-844b9cbc57-c75mp" Oct 2 20:38:20.801081 kubelet[2520]: I1002 20:38:20.801047 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-xtables-lock\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801081 kubelet[2520]: I1002 20:38:20.801066 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/752fd7c8-bebf-461c-828e-fce633d5aaff-node-certs\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801132 kubelet[2520]: I1002 20:38:20.801096 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-flexvol-driver-host\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801132 kubelet[2520]: I1002 20:38:20.801116 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/91079101-1ec9-4052-80f7-91fd67ae8e61-typha-certs\") pod \"calico-typha-844b9cbc57-c75mp\" (UID: \"91079101-1ec9-4052-80f7-91fd67ae8e61\") " pod="calico-system/calico-typha-844b9cbc57-c75mp" Oct 2 20:38:20.801177 kubelet[2520]: I1002 20:38:20.801137 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/91079101-1ec9-4052-80f7-91fd67ae8e61-tigera-ca-bundle\") pod \"calico-typha-844b9cbc57-c75mp\" (UID: \"91079101-1ec9-4052-80f7-91fd67ae8e61\") " pod="calico-system/calico-typha-844b9cbc57-c75mp" Oct 2 20:38:20.801177 kubelet[2520]: I1002 20:38:20.801159 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-lib-modules\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.801227 kubelet[2520]: I1002 20:38:20.801177 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/752fd7c8-bebf-461c-828e-fce633d5aaff-var-lib-calico\") pod \"calico-node-xx5rx\" (UID: \"752fd7c8-bebf-461c-828e-fce633d5aaff\") " pod="calico-system/calico-node-xx5rx" Oct 2 20:38:20.918177 kubelet[2520]: E1002 20:38:20.918131 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.918177 kubelet[2520]: W1002 20:38:20.918162 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.918335 kubelet[2520]: E1002 20:38:20.918186 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.918519 kubelet[2520]: E1002 20:38:20.918499 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.918519 kubelet[2520]: W1002 20:38:20.918514 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.918519 kubelet[2520]: E1002 20:38:20.918527 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.918754 kubelet[2520]: E1002 20:38:20.918737 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.918754 kubelet[2520]: W1002 20:38:20.918750 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.918827 kubelet[2520]: E1002 20:38:20.918766 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.918971 kubelet[2520]: E1002 20:38:20.918955 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.918971 kubelet[2520]: W1002 20:38:20.918967 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.919054 kubelet[2520]: E1002 20:38:20.918979 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.919179 kubelet[2520]: E1002 20:38:20.919163 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.919179 kubelet[2520]: W1002 20:38:20.919175 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.919257 kubelet[2520]: E1002 20:38:20.919187 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.919386 kubelet[2520]: E1002 20:38:20.919364 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.919386 kubelet[2520]: W1002 20:38:20.919382 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.919461 kubelet[2520]: E1002 20:38:20.919394 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.924685 kubelet[2520]: E1002 20:38:20.924659 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.924685 kubelet[2520]: W1002 20:38:20.924681 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.924822 kubelet[2520]: E1002 20:38:20.924699 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.925589 kubelet[2520]: E1002 20:38:20.925557 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.925589 kubelet[2520]: W1002 20:38:20.925575 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.926678 kubelet[2520]: E1002 20:38:20.926661 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.927317 kubelet[2520]: E1002 20:38:20.927280 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.927317 kubelet[2520]: W1002 20:38:20.927299 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.927507 kubelet[2520]: E1002 20:38:20.927489 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.927507 kubelet[2520]: W1002 20:38:20.927502 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.927590 kubelet[2520]: E1002 20:38:20.927514 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.928300 kubelet[2520]: E1002 20:38:20.928275 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.928487 kubelet[2520]: E1002 20:38:20.928450 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.928487 kubelet[2520]: W1002 20:38:20.928463 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.928487 kubelet[2520]: E1002 20:38:20.928475 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.928615 kubelet[2520]: E1002 20:38:20.928599 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.928615 kubelet[2520]: W1002 20:38:20.928610 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.928679 kubelet[2520]: E1002 20:38:20.928621 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.928766 kubelet[2520]: E1002 20:38:20.928749 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.928766 kubelet[2520]: W1002 20:38:20.928762 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.928827 kubelet[2520]: E1002 20:38:20.928771 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.937091 kubelet[2520]: E1002 20:38:20.937060 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.937091 kubelet[2520]: W1002 20:38:20.937077 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.937091 kubelet[2520]: E1002 20:38:20.937090 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.952688 kubelet[2520]: E1002 20:38:20.952659 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.952688 kubelet[2520]: W1002 20:38:20.952680 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.952845 kubelet[2520]: E1002 20:38:20.952699 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:20.966876 kubelet[2520]: E1002 20:38:20.966839 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:20.966876 kubelet[2520]: W1002 20:38:20.966867 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:20.967016 kubelet[2520]: E1002 20:38:20.966888 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:21.007209 env[1350]: time="2023-10-02T20:38:21.007099041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-844b9cbc57-c75mp,Uid:91079101-1ec9-4052-80f7-91fd67ae8e61,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:21.051130 env[1350]: time="2023-10-02T20:38:21.050917841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:21.051130 env[1350]: time="2023-10-02T20:38:21.050957401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:21.051130 env[1350]: time="2023-10-02T20:38:21.050967961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:21.053550 env[1350]: time="2023-10-02T20:38:21.052435163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04a607b6ebea469e11af8aab1e5fec04f622ed59efe755122cb1fc721863a7ec pid=2960 runtime=io.containerd.runc.v2 Oct 2 20:38:21.060239 env[1350]: time="2023-10-02T20:38:21.060200970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xx5rx,Uid:752fd7c8-bebf-461c-828e-fce633d5aaff,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:21.069978 systemd[1]: Started cri-containerd-04a607b6ebea469e11af8aab1e5fec04f622ed59efe755122cb1fc721863a7ec.scope. Oct 2 20:38:21.102996 env[1350]: time="2023-10-02T20:38:21.102905169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:21.102996 env[1350]: time="2023-10-02T20:38:21.102959969Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:21.103243 env[1350]: time="2023-10-02T20:38:21.102970689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:21.103243 env[1350]: time="2023-10-02T20:38:21.103165569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685 pid=2993 runtime=io.containerd.runc.v2 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.110000 audit: BPF prog-id=125 op=LOAD Oct 2 20:38:21.110000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.110000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2960 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613630376236656265613436396531316166386161623165356665 Oct 2 20:38:21.110000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.110000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2960 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613630376236656265613436396531316166386161623165356665 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit: BPF prog-id=126 op=LOAD Oct 2 20:38:21.111000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2960 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613630376236656265613436396531316166386161623165356665 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.111000 audit: BPF prog-id=127 op=LOAD Oct 2 20:38:21.111000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2960 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613630376236656265613436396531316166386161623165356665 Oct 2 20:38:21.112000 audit: BPF prog-id=127 op=UNLOAD Oct 2 20:38:21.112000 audit: BPF prog-id=126 op=UNLOAD Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.112000 audit: BPF prog-id=128 op=LOAD Oct 2 20:38:21.112000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2960 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613630376236656265613436396531316166386161623165356665 Oct 2 20:38:21.126046 systemd[1]: Started cri-containerd-47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685.scope. Oct 2 20:38:21.157435 env[1350]: time="2023-10-02T20:38:21.157393060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-844b9cbc57-c75mp,Uid:91079101-1ec9-4052-80f7-91fd67ae8e61,Namespace:calico-system,Attempt:0,} returns sandbox id \"04a607b6ebea469e11af8aab1e5fec04f622ed59efe755122cb1fc721863a7ec\"" Oct 2 20:38:21.158994 env[1350]: time="2023-10-02T20:38:21.158970101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.171000 audit: BPF prog-id=129 op=LOAD Oct 2 20:38:21.171000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.171000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2993 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437623163383134653032646166626332666536353131363033663131 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2993 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437623163383134653032646166626332666536353131363033663131 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit: BPF prog-id=130 op=LOAD Oct 2 20:38:21.172000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2993 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437623163383134653032646166626332666536353131363033663131 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.172000 audit: BPF prog-id=131 op=LOAD Oct 2 20:38:21.172000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2993 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437623163383134653032646166626332666536353131363033663131 Oct 2 20:38:21.173000 audit: BPF prog-id=131 op=UNLOAD Oct 2 20:38:21.173000 audit: BPF prog-id=130 op=UNLOAD Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:21.173000 audit: BPF prog-id=132 op=LOAD Oct 2 20:38:21.173000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2993 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437623163383134653032646166626332666536353131363033663131 Oct 2 20:38:21.189451 env[1350]: time="2023-10-02T20:38:21.189406769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xx5rx,Uid:752fd7c8-bebf-461c-828e-fce633d5aaff,Namespace:calico-system,Attempt:0,} returns sandbox id \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\"" Oct 2 20:38:21.591000 audit[3057]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:21.591000 audit[3057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc6743250 a2=0 a3=ffffb95716c0 items=0 ppid=2675 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:21.592000 audit[3057]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:21.592000 audit[3057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc6743250 a2=0 a3=ffffb95716c0 items=0 ppid=2675 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:22.331322 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount788343817.mount: Deactivated successfully. Oct 2 20:38:22.980894 env[1350]: time="2023-10-02T20:38:22.980847487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.986801 env[1350]: time="2023-10-02T20:38:22.986761293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.990466 env[1350]: time="2023-10-02T20:38:22.990440576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.994259 env[1350]: time="2023-10-02T20:38:22.994232659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.994767 env[1350]: time="2023-10-02T20:38:22.994740500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 20:38:22.997480 env[1350]: time="2023-10-02T20:38:22.997431422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:38:22.998666 env[1350]: time="2023-10-02T20:38:22.998631863Z" level=info msg="CreateContainer within sandbox \"04a607b6ebea469e11af8aab1e5fec04f622ed59efe755122cb1fc721863a7ec\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 20:38:23.023301 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3436207765.mount: Deactivated successfully. Oct 2 20:38:23.027467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3636516692.mount: Deactivated successfully. Oct 2 20:38:23.046253 env[1350]: time="2023-10-02T20:38:23.046207946Z" level=info msg="CreateContainer within sandbox \"04a607b6ebea469e11af8aab1e5fec04f622ed59efe755122cb1fc721863a7ec\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"eb5276bd60e326198cd6225cdcd04c9bed0f992b9b08f2138c3f6a4729c5227c\"" Oct 2 20:38:23.046907 env[1350]: time="2023-10-02T20:38:23.046887426Z" level=info msg="StartContainer for \"eb5276bd60e326198cd6225cdcd04c9bed0f992b9b08f2138c3f6a4729c5227c\"" Oct 2 20:38:23.070997 systemd[1]: Started cri-containerd-eb5276bd60e326198cd6225cdcd04c9bed0f992b9b08f2138c3f6a4729c5227c.scope. Oct 2 20:38:23.095402 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 20:38:23.095511 kernel: audit: type=1400 audit(1696279103.089:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128706 kernel: audit: type=1400 audit(1696279103.089:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128848 kernel: audit: type=1400 audit(1696279103.089:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.163387 kernel: audit: type=1400 audit(1696279103.089:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.180810 kernel: audit: type=1400 audit(1696279103.089:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.199667 kernel: audit: type=1400 audit(1696279103.089:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.216805 kernel: audit: type=1400 audit(1696279103.089:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.234520 kernel: audit: type=1400 audit(1696279103.089:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.254646 kernel: audit: type=1400 audit(1696279103.089:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.274850 kernel: audit: type=1400 audit(1696279103.095:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit: BPF prog-id=133 op=LOAD Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2960 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:23.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562353237366264363065333236313938636436323235636463643034 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2960 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:23.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562353237366264363065333236313938636436323235636463643034 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.095000 audit: BPF prog-id=134 op=LOAD Oct 2 20:38:23.095000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2960 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:23.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562353237366264363065333236313938636436323235636463643034 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.112000 audit: BPF prog-id=135 op=LOAD Oct 2 20:38:23.112000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2960 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:23.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562353237366264363065333236313938636436323235636463643034 Oct 2 20:38:23.128000 audit: BPF prog-id=135 op=UNLOAD Oct 2 20:38:23.128000 audit: BPF prog-id=134 op=UNLOAD Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:23.128000 audit: BPF prog-id=136 op=LOAD Oct 2 20:38:23.128000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2960 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:23.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562353237366264363065333236313938636436323235636463643034 Oct 2 20:38:23.278934 env[1350]: time="2023-10-02T20:38:23.278895793Z" level=info msg="StartContainer for \"eb5276bd60e326198cd6225cdcd04c9bed0f992b9b08f2138c3f6a4729c5227c\" returns successfully" Oct 2 20:38:23.815136 kubelet[2520]: E1002 20:38:23.815107 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815136 kubelet[2520]: W1002 20:38:23.815138 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.815481 kubelet[2520]: E1002 20:38:23.815156 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.815481 kubelet[2520]: E1002 20:38:23.815317 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815481 kubelet[2520]: W1002 20:38:23.815325 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.815481 kubelet[2520]: E1002 20:38:23.815338 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.815481 kubelet[2520]: E1002 20:38:23.815475 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815481 kubelet[2520]: W1002 20:38:23.815483 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.815666 kubelet[2520]: E1002 20:38:23.815493 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.815691 kubelet[2520]: E1002 20:38:23.815679 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815691 kubelet[2520]: W1002 20:38:23.815688 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.815734 kubelet[2520]: E1002 20:38:23.815698 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.815845 kubelet[2520]: E1002 20:38:23.815831 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815845 kubelet[2520]: W1002 20:38:23.815843 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.815913 kubelet[2520]: E1002 20:38:23.815853 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.815996 kubelet[2520]: E1002 20:38:23.815982 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.815996 kubelet[2520]: W1002 20:38:23.815994 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816050 kubelet[2520]: E1002 20:38:23.816004 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.816226 kubelet[2520]: E1002 20:38:23.816211 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.816226 kubelet[2520]: W1002 20:38:23.816225 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816307 kubelet[2520]: E1002 20:38:23.816238 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.816403 kubelet[2520]: E1002 20:38:23.816388 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.816403 kubelet[2520]: W1002 20:38:23.816401 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816471 kubelet[2520]: E1002 20:38:23.816411 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.816560 kubelet[2520]: E1002 20:38:23.816546 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.816560 kubelet[2520]: W1002 20:38:23.816558 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816651 kubelet[2520]: E1002 20:38:23.816568 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.816745 kubelet[2520]: E1002 20:38:23.816732 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.816745 kubelet[2520]: W1002 20:38:23.816743 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816811 kubelet[2520]: E1002 20:38:23.816753 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.816893 kubelet[2520]: E1002 20:38:23.816881 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.816893 kubelet[2520]: W1002 20:38:23.816892 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.816959 kubelet[2520]: E1002 20:38:23.816902 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.817044 kubelet[2520]: E1002 20:38:23.817030 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.817044 kubelet[2520]: W1002 20:38:23.817042 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.817100 kubelet[2520]: E1002 20:38:23.817053 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.819435 kubelet[2520]: E1002 20:38:23.819413 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.819435 kubelet[2520]: W1002 20:38:23.819429 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.819555 kubelet[2520]: E1002 20:38:23.819448 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.819674 kubelet[2520]: E1002 20:38:23.819659 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.819674 kubelet[2520]: W1002 20:38:23.819673 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.819739 kubelet[2520]: E1002 20:38:23.819698 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.819889 kubelet[2520]: E1002 20:38:23.819871 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.819889 kubelet[2520]: W1002 20:38:23.819886 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.819953 kubelet[2520]: E1002 20:38:23.819902 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.820087 kubelet[2520]: E1002 20:38:23.820069 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.820087 kubelet[2520]: W1002 20:38:23.820083 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.820147 kubelet[2520]: E1002 20:38:23.820099 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.820246 kubelet[2520]: E1002 20:38:23.820220 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.820246 kubelet[2520]: W1002 20:38:23.820240 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.820300 kubelet[2520]: E1002 20:38:23.820250 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.820368 kubelet[2520]: E1002 20:38:23.820356 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.820408 kubelet[2520]: W1002 20:38:23.820371 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.820408 kubelet[2520]: E1002 20:38:23.820384 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.820545 kubelet[2520]: E1002 20:38:23.820528 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.820545 kubelet[2520]: W1002 20:38:23.820541 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.820606 kubelet[2520]: E1002 20:38:23.820550 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822042 kubelet[2520]: E1002 20:38:23.821783 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822042 kubelet[2520]: W1002 20:38:23.821805 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822042 kubelet[2520]: E1002 20:38:23.821987 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822042 kubelet[2520]: W1002 20:38:23.821995 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822204 kubelet[2520]: E1002 20:38:23.822116 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822204 kubelet[2520]: W1002 20:38:23.822130 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822204 kubelet[2520]: E1002 20:38:23.822141 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822361 kubelet[2520]: E1002 20:38:23.822263 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822361 kubelet[2520]: W1002 20:38:23.822283 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822361 kubelet[2520]: E1002 20:38:23.822294 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822361 kubelet[2520]: E1002 20:38:23.822307 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822361 kubelet[2520]: E1002 20:38:23.822340 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822533 kubelet[2520]: E1002 20:38:23.822405 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822533 kubelet[2520]: W1002 20:38:23.822419 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822533 kubelet[2520]: E1002 20:38:23.822431 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822632 kubelet[2520]: E1002 20:38:23.822591 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822632 kubelet[2520]: W1002 20:38:23.822600 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.822632 kubelet[2520]: E1002 20:38:23.822611 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.822957 kubelet[2520]: E1002 20:38:23.822936 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.822957 kubelet[2520]: W1002 20:38:23.822953 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.823042 kubelet[2520]: E1002 20:38:23.822973 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.823150 kubelet[2520]: E1002 20:38:23.823135 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.823150 kubelet[2520]: W1002 20:38:23.823150 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.823230 kubelet[2520]: E1002 20:38:23.823161 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.823316 kubelet[2520]: E1002 20:38:23.823301 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.823316 kubelet[2520]: W1002 20:38:23.823315 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.823394 kubelet[2520]: E1002 20:38:23.823326 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.823486 kubelet[2520]: E1002 20:38:23.823472 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.823486 kubelet[2520]: W1002 20:38:23.823484 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.823553 kubelet[2520]: E1002 20:38:23.823501 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:23.824469 kubelet[2520]: I1002 20:38:23.824100 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-844b9cbc57-c75mp" podStartSLOduration=-9.22337203303071e+09 pod.CreationTimestamp="2023-10-02 20:38:20 +0000 UTC" firstStartedPulling="2023-10-02 20:38:21.158719781 +0000 UTC m=+22.691431913" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:23.819264634 +0000 UTC m=+25.351976766" watchObservedRunningTime="2023-10-02 20:38:23.824066038 +0000 UTC m=+25.356778130" Oct 2 20:38:23.824724 kubelet[2520]: E1002 20:38:23.824703 2520 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:23.824724 kubelet[2520]: W1002 20:38:23.824721 2520 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:23.824810 kubelet[2520]: E1002 20:38:23.824737 2520 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:24.180808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2401498719.mount: Deactivated successfully. Oct 2 20:38:24.306109 env[1350]: time="2023-10-02T20:38:24.306058863Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:24.313595 env[1350]: time="2023-10-02T20:38:24.313527829Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:24.318026 env[1350]: time="2023-10-02T20:38:24.317985273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:24.321164 env[1350]: time="2023-10-02T20:38:24.321126236Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:24.321697 env[1350]: time="2023-10-02T20:38:24.321665637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 20:38:24.325146 env[1350]: time="2023-10-02T20:38:24.325116360Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:38:24.357655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2471634419.mount: Deactivated successfully. Oct 2 20:38:24.370675 env[1350]: time="2023-10-02T20:38:24.370629879Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1\"" Oct 2 20:38:24.373103 env[1350]: time="2023-10-02T20:38:24.372571321Z" level=info msg="StartContainer for \"90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1\"" Oct 2 20:38:24.396398 systemd[1]: Started cri-containerd-90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1.scope. Oct 2 20:38:24.416000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.416000 audit[3139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2993 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653165656237663938383135633530336338386538336132323037 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit: BPF prog-id=137 op=LOAD Oct 2 20:38:24.417000 audit[3139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2993 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653165656237663938383135633530336338386538336132323037 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.417000 audit: BPF prog-id=138 op=LOAD Oct 2 20:38:24.417000 audit[3139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2993 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653165656237663938383135633530336338386538336132323037 Oct 2 20:38:24.418000 audit: BPF prog-id=138 op=UNLOAD Oct 2 20:38:24.418000 audit: BPF prog-id=137 op=UNLOAD Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:24.418000 audit: BPF prog-id=139 op=LOAD Oct 2 20:38:24.418000 audit[3139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2993 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653165656237663938383135633530336338386538336132323037 Oct 2 20:38:24.440310 env[1350]: time="2023-10-02T20:38:24.439207979Z" level=info msg="StartContainer for \"90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1\" returns successfully" Oct 2 20:38:24.448499 systemd[1]: cri-containerd-90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1.scope: Deactivated successfully. Oct 2 20:38:24.452000 audit: BPF prog-id=139 op=UNLOAD Oct 2 20:38:24.887000 audit[3208]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:24.887000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffdd0d4df0 a2=0 a3=ffff959756c0 items=0 ppid=2675 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:24.888000 audit[3208]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:24.888000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffdd0d4df0 a2=0 a3=ffff959756c0 items=0 ppid=2675 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:24.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:25.380608 env[1350]: time="2023-10-02T20:38:25.380364757Z" level=info msg="shim disconnected" id=90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1 Oct 2 20:38:25.380608 env[1350]: time="2023-10-02T20:38:25.380423717Z" level=warning msg="cleaning up after shim disconnected" id=90e1eeb7f98815c503c88e83a2207ab05a4126e3f49fd0f33831ef6374beeda1 namespace=k8s.io Oct 2 20:38:25.380608 env[1350]: time="2023-10-02T20:38:25.380432677Z" level=info msg="cleaning up dead shim" Oct 2 20:38:25.392222 env[1350]: time="2023-10-02T20:38:25.392175607Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3209 runtime=io.containerd.runc.v2\n" Oct 2 20:38:25.814495 env[1350]: time="2023-10-02T20:38:25.814459690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:38:26.897407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3475386490.mount: Deactivated successfully. Oct 2 20:38:28.856258 env[1350]: time="2023-10-02T20:38:28.856193464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.860378 env[1350]: time="2023-10-02T20:38:28.860348347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.863485 env[1350]: time="2023-10-02T20:38:28.863423309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.866733 env[1350]: time="2023-10-02T20:38:28.866698872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.867340 env[1350]: time="2023-10-02T20:38:28.867304113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 20:38:28.871822 env[1350]: time="2023-10-02T20:38:28.871783716Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:38:28.890835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4121619199.mount: Deactivated successfully. Oct 2 20:38:28.895360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount858364088.mount: Deactivated successfully. Oct 2 20:38:28.916339 env[1350]: time="2023-10-02T20:38:28.916297513Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8\"" Oct 2 20:38:28.917338 env[1350]: time="2023-10-02T20:38:28.917318193Z" level=info msg="StartContainer for \"d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8\"" Oct 2 20:38:28.947464 systemd[1]: Started cri-containerd-d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8.scope. Oct 2 20:38:28.990681 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 20:38:28.990808 kernel: audit: type=1400 audit(1696279108.967:1152): avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2993 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:29.017191 kernel: audit: type=1300 audit(1696279108.967:1152): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2993 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633464353439323963653866353362326136353037623135626265 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.060198 kernel: audit: type=1327 audit(1696279108.967:1152): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633464353439323963653866353362326136353037623135626265 Oct 2 20:38:29.060306 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.098937 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.099056 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.116479 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.134693 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.134781 env[1350]: time="2023-10-02T20:38:29.134568609Z" level=info msg="StartContainer for \"d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8\" returns successfully" Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.151812 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:29.169633 kernel: audit: type=1400 audit(1696279108.967:1153): avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.967000 audit: BPF prog-id=140 op=LOAD Oct 2 20:38:28.967000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2993 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633464353439323963653866353362326136353037623135626265 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.973000 audit: BPF prog-id=141 op=LOAD Oct 2 20:38:28.973000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2993 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633464353439323963653866353362326136353037623135626265 Oct 2 20:38:28.991000 audit: BPF prog-id=141 op=UNLOAD Oct 2 20:38:28.991000 audit: BPF prog-id=140 op=UNLOAD Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.991000 audit: BPF prog-id=142 op=LOAD Oct 2 20:38:28.991000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2993 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633464353439323963653866353362326136353037623135626265 Oct 2 20:38:30.781205 env[1350]: time="2023-10-02T20:38:30.781133401Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:38:30.783960 systemd[1]: cri-containerd-d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8.scope: Deactivated successfully. Oct 2 20:38:30.789000 audit: BPF prog-id=142 op=UNLOAD Oct 2 20:38:30.812416 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8-rootfs.mount: Deactivated successfully. Oct 2 20:38:30.871629 kubelet[2520]: I1002 20:38:30.871597 2520 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 20:38:30.982009 kubelet[2520]: I1002 20:38:30.894459 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:30.982009 kubelet[2520]: I1002 20:38:30.898696 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:30.982009 kubelet[2520]: I1002 20:38:30.907834 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:30.982009 kubelet[2520]: I1002 20:38:30.923816 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:30.899076 systemd[1]: Created slice kubepods-burstable-pod42618cda_fafb_4a24_a677_1f95c0382d4b.slice. Oct 2 20:38:30.904835 systemd[1]: Created slice kubepods-besteffort-pod741b46f9_6473_4feb_b347_0df9b87013ae.slice. Oct 2 20:38:30.912088 systemd[1]: Created slice kubepods-burstable-pod109dfe35_73ee_4c74_8dcf_117ec6392f04.slice. Oct 2 20:38:30.928673 systemd[1]: Created slice kubepods-besteffort-podf80acaac_1174_4751_8af1_1b7ba97c4d9f.slice. Oct 2 20:38:31.068479 kubelet[2520]: I1002 20:38:31.067915 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/f80acaac-1174-4751-8af1-1b7ba97c4d9f-etccalico\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068479 kubelet[2520]: I1002 20:38:31.067968 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5n82p\" (UniqueName: \"kubernetes.io/projected/109dfe35-73ee-4c74-8dcf-117ec6392f04-kube-api-access-5n82p\") pod \"coredns-787d4945fb-dpnlr\" (UID: \"109dfe35-73ee-4c74-8dcf-117ec6392f04\") " pod="kube-system/coredns-787d4945fb-dpnlr" Oct 2 20:38:31.068479 kubelet[2520]: I1002 20:38:31.067991 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f80acaac-1174-4751-8af1-1b7ba97c4d9f-varrun\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068479 kubelet[2520]: I1002 20:38:31.068016 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f80acaac-1174-4751-8af1-1b7ba97c4d9f-socket-dir\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068479 kubelet[2520]: I1002 20:38:31.068040 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f80acaac-1174-4751-8af1-1b7ba97c4d9f-registration-dir\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068734 kubelet[2520]: I1002 20:38:31.068075 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/42618cda-fafb-4a24-a677-1f95c0382d4b-config-volume\") pod \"coredns-787d4945fb-m9qtj\" (UID: \"42618cda-fafb-4a24-a677-1f95c0382d4b\") " pod="kube-system/coredns-787d4945fb-m9qtj" Oct 2 20:38:31.068734 kubelet[2520]: I1002 20:38:31.068099 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f80acaac-1174-4751-8af1-1b7ba97c4d9f-kubelet-dir\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068734 kubelet[2520]: I1002 20:38:31.068123 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bl6kc\" (UniqueName: \"kubernetes.io/projected/f80acaac-1174-4751-8af1-1b7ba97c4d9f-kube-api-access-bl6kc\") pod \"csi-node-driver-kk5x4\" (UID: \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\") " pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.068734 kubelet[2520]: I1002 20:38:31.068145 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7kdxq\" (UniqueName: \"kubernetes.io/projected/42618cda-fafb-4a24-a677-1f95c0382d4b-kube-api-access-7kdxq\") pod \"coredns-787d4945fb-m9qtj\" (UID: \"42618cda-fafb-4a24-a677-1f95c0382d4b\") " pod="kube-system/coredns-787d4945fb-m9qtj" Oct 2 20:38:31.068734 kubelet[2520]: I1002 20:38:31.068169 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/109dfe35-73ee-4c74-8dcf-117ec6392f04-config-volume\") pod \"coredns-787d4945fb-dpnlr\" (UID: \"109dfe35-73ee-4c74-8dcf-117ec6392f04\") " pod="kube-system/coredns-787d4945fb-dpnlr" Oct 2 20:38:31.068856 kubelet[2520]: I1002 20:38:31.068204 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d6dqq\" (UniqueName: \"kubernetes.io/projected/741b46f9-6473-4feb-b347-0df9b87013ae-kube-api-access-d6dqq\") pod \"calico-kube-controllers-69c848ddc6-sw4vd\" (UID: \"741b46f9-6473-4feb-b347-0df9b87013ae\") " pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" Oct 2 20:38:31.284994 env[1350]: time="2023-10-02T20:38:31.284699835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kk5x4,Uid:f80acaac-1174-4751-8af1-1b7ba97c4d9f,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:31.284994 env[1350]: time="2023-10-02T20:38:31.284787275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-sw4vd,Uid:741b46f9-6473-4feb-b347-0df9b87013ae,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:31.543299 env[1350]: time="2023-10-02T20:38:31.543246716Z" level=info msg="shim disconnected" id=d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8 Oct 2 20:38:31.543299 env[1350]: time="2023-10-02T20:38:31.543295076Z" level=warning msg="cleaning up after shim disconnected" id=d0c4d54929ce8f53b2a6507b15bbe0b5dabd860fda3e6967d8685984947736d8 namespace=k8s.io Oct 2 20:38:31.543471 env[1350]: time="2023-10-02T20:38:31.543306356Z" level=info msg="cleaning up dead shim" Oct 2 20:38:31.558962 env[1350]: time="2023-10-02T20:38:31.558906728Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3284 runtime=io.containerd.runc.v2\n" Oct 2 20:38:31.584096 env[1350]: time="2023-10-02T20:38:31.584051948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m9qtj,Uid:42618cda-fafb-4a24-a677-1f95c0382d4b,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:31.584628 env[1350]: time="2023-10-02T20:38:31.584576308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-dpnlr,Uid:109dfe35-73ee-4c74-8dcf-117ec6392f04,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:31.694728 env[1350]: time="2023-10-02T20:38:31.694652594Z" level=error msg="Failed to destroy network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.695238 env[1350]: time="2023-10-02T20:38:31.695190634Z" level=error msg="encountered an error cleaning up failed sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.695298 env[1350]: time="2023-10-02T20:38:31.695248634Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kk5x4,Uid:f80acaac-1174-4751-8af1-1b7ba97c4d9f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.697456 kubelet[2520]: E1002 20:38:31.695482 2520 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.697456 kubelet[2520]: E1002 20:38:31.695546 2520 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.697456 kubelet[2520]: E1002 20:38:31.695567 2520 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kk5x4" Oct 2 20:38:31.697742 kubelet[2520]: E1002 20:38:31.695670 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:31.737659 env[1350]: time="2023-10-02T20:38:31.737575307Z" level=error msg="Failed to destroy network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.738454 env[1350]: time="2023-10-02T20:38:31.738420548Z" level=error msg="encountered an error cleaning up failed sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.738613 env[1350]: time="2023-10-02T20:38:31.738570548Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-sw4vd,Uid:741b46f9-6473-4feb-b347-0df9b87013ae,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.740750 kubelet[2520]: E1002 20:38:31.738909 2520 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.740750 kubelet[2520]: E1002 20:38:31.738968 2520 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" Oct 2 20:38:31.740750 kubelet[2520]: E1002 20:38:31.738990 2520 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" Oct 2 20:38:31.740902 kubelet[2520]: E1002 20:38:31.740708 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-sw4vd_calico-system(741b46f9-6473-4feb-b347-0df9b87013ae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-sw4vd_calico-system(741b46f9-6473-4feb-b347-0df9b87013ae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" podUID=741b46f9-6473-4feb-b347-0df9b87013ae Oct 2 20:38:31.759997 env[1350]: time="2023-10-02T20:38:31.759942605Z" level=error msg="Failed to destroy network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.760497 env[1350]: time="2023-10-02T20:38:31.760464845Z" level=error msg="encountered an error cleaning up failed sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.760661 env[1350]: time="2023-10-02T20:38:31.760627365Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m9qtj,Uid:42618cda-fafb-4a24-a677-1f95c0382d4b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.760973 kubelet[2520]: E1002 20:38:31.760933 2520 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.761068 kubelet[2520]: E1002 20:38:31.760992 2520 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-m9qtj" Oct 2 20:38:31.761068 kubelet[2520]: E1002 20:38:31.761017 2520 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-m9qtj" Oct 2 20:38:31.761130 kubelet[2520]: E1002 20:38:31.761065 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-m9qtj_kube-system(42618cda-fafb-4a24-a677-1f95c0382d4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-m9qtj_kube-system(42618cda-fafb-4a24-a677-1f95c0382d4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-m9qtj" podUID=42618cda-fafb-4a24-a677-1f95c0382d4b Oct 2 20:38:31.779834 env[1350]: time="2023-10-02T20:38:31.779779220Z" level=error msg="Failed to destroy network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.780340 env[1350]: time="2023-10-02T20:38:31.780305620Z" level=error msg="encountered an error cleaning up failed sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.780474 env[1350]: time="2023-10-02T20:38:31.780448900Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-dpnlr,Uid:109dfe35-73ee-4c74-8dcf-117ec6392f04,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.782841 kubelet[2520]: E1002 20:38:31.780776 2520 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.782841 kubelet[2520]: E1002 20:38:31.780847 2520 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-dpnlr" Oct 2 20:38:31.782841 kubelet[2520]: E1002 20:38:31.780868 2520 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-dpnlr" Oct 2 20:38:31.783658 kubelet[2520]: E1002 20:38:31.780929 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-dpnlr_kube-system(109dfe35-73ee-4c74-8dcf-117ec6392f04)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-dpnlr_kube-system(109dfe35-73ee-4c74-8dcf-117ec6392f04)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-dpnlr" podUID=109dfe35-73ee-4c74-8dcf-117ec6392f04 Oct 2 20:38:31.825564 kubelet[2520]: I1002 20:38:31.823878 2520 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:31.826694 env[1350]: time="2023-10-02T20:38:31.826664736Z" level=info msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" Oct 2 20:38:31.827679 kubelet[2520]: I1002 20:38:31.827650 2520 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:31.829885 env[1350]: time="2023-10-02T20:38:31.829752099Z" level=info msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" Oct 2 20:38:31.837337 env[1350]: time="2023-10-02T20:38:31.837281945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:38:31.838615 kubelet[2520]: I1002 20:38:31.838556 2520 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:31.839504 env[1350]: time="2023-10-02T20:38:31.839451746Z" level=info msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" Oct 2 20:38:31.843128 kubelet[2520]: I1002 20:38:31.843107 2520 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:31.843718 env[1350]: time="2023-10-02T20:38:31.843692550Z" level=info msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" Oct 2 20:38:31.891743 env[1350]: time="2023-10-02T20:38:31.891681627Z" level=error msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" failed" error="failed to destroy network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.891983 kubelet[2520]: E1002 20:38:31.891958 2520 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:31.892250 kubelet[2520]: E1002 20:38:31.892053 2520 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2} Oct 2 20:38:31.892250 kubelet[2520]: E1002 20:38:31.892100 2520 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"741b46f9-6473-4feb-b347-0df9b87013ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.892250 kubelet[2520]: E1002 20:38:31.892133 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"741b46f9-6473-4feb-b347-0df9b87013ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" podUID=741b46f9-6473-4feb-b347-0df9b87013ae Oct 2 20:38:31.929654 env[1350]: time="2023-10-02T20:38:31.929586976Z" level=error msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" failed" error="failed to destroy network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.930072 kubelet[2520]: E1002 20:38:31.930043 2520 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:31.930147 kubelet[2520]: E1002 20:38:31.930098 2520 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423} Oct 2 20:38:31.930147 kubelet[2520]: E1002 20:38:31.930135 2520 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.930227 kubelet[2520]: E1002 20:38:31.930175 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f80acaac-1174-4751-8af1-1b7ba97c4d9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:31.930903 env[1350]: time="2023-10-02T20:38:31.930861537Z" level=error msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" failed" error="failed to destroy network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.931062 kubelet[2520]: E1002 20:38:31.931025 2520 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:31.931062 kubelet[2520]: E1002 20:38:31.931069 2520 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028} Oct 2 20:38:31.931139 kubelet[2520]: E1002 20:38:31.931096 2520 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"42618cda-fafb-4a24-a677-1f95c0382d4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.931139 kubelet[2520]: E1002 20:38:31.931130 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"42618cda-fafb-4a24-a677-1f95c0382d4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-m9qtj" podUID=42618cda-fafb-4a24-a677-1f95c0382d4b Oct 2 20:38:31.942686 env[1350]: time="2023-10-02T20:38:31.942626307Z" level=error msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" failed" error="failed to destroy network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.943067 kubelet[2520]: E1002 20:38:31.943040 2520 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:31.943129 kubelet[2520]: E1002 20:38:31.943094 2520 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a} Oct 2 20:38:31.943161 kubelet[2520]: E1002 20:38:31.943129 2520 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"109dfe35-73ee-4c74-8dcf-117ec6392f04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.943211 kubelet[2520]: E1002 20:38:31.943190 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"109dfe35-73ee-4c74-8dcf-117ec6392f04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-dpnlr" podUID=109dfe35-73ee-4c74-8dcf-117ec6392f04 Oct 2 20:38:32.183806 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423-shm.mount: Deactivated successfully. Oct 2 20:38:35.618258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount649458009.mount: Deactivated successfully. Oct 2 20:38:35.719416 env[1350]: time="2023-10-02T20:38:35.719373257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.725516 env[1350]: time="2023-10-02T20:38:35.725489141Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.728423 env[1350]: time="2023-10-02T20:38:35.728380183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.734160 env[1350]: time="2023-10-02T20:38:35.734133667Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.734553 env[1350]: time="2023-10-02T20:38:35.734528348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 20:38:35.738227 env[1350]: time="2023-10-02T20:38:35.738199550Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:38:35.759466 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1291541981.mount: Deactivated successfully. Oct 2 20:38:35.763421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1217698446.mount: Deactivated successfully. Oct 2 20:38:35.777665 env[1350]: time="2023-10-02T20:38:35.777622059Z" level=info msg="CreateContainer within sandbox \"47b1c814e02dafbc2fe6511603f110f4c6dda9d5c4a831f4886014d3c3c8c685\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54\"" Oct 2 20:38:35.779928 env[1350]: time="2023-10-02T20:38:35.778239340Z" level=info msg="StartContainer for \"ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54\"" Oct 2 20:38:35.803298 systemd[1]: Started cri-containerd-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54.scope. Oct 2 20:38:35.846574 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 20:38:35.846769 kernel: audit: type=1400 audit(1696279115.823:1159): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846827 kernel: audit: type=1300 audit(1696279115.823:1159): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2993 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2993 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.872703 kernel: audit: type=1327 audit(1696279115.823:1159): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633330336361616436383035653638343037306166643139396335 Oct 2 20:38:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633330336361616436383035653638343037306166643139396335 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913487 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.931436 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.948715 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.966405 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.984568 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.984715 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.985063 env[1350]: time="2023-10-02T20:38:35.985021411Z" level=info msg="StartContainer for \"ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54\" returns successfully" Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.018760 kernel: audit: type=1400 audit(1696279115.823:1160): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.823000 audit: BPF prog-id=143 op=LOAD Oct 2 20:38:35.823000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2993 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633330336361616436383035653638343037306166643139396335 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.829000 audit: BPF prog-id=144 op=LOAD Oct 2 20:38:35.829000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2993 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633330336361616436383035653638343037306166643139396335 Oct 2 20:38:35.846000 audit: BPF prog-id=144 op=UNLOAD Oct 2 20:38:35.846000 audit: BPF prog-id=143 op=UNLOAD Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.846000 audit: BPF prog-id=145 op=LOAD Oct 2 20:38:35.846000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2993 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633330336361616436383035653638343037306166643139396335 Oct 2 20:38:36.444378 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:38:36.444626 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:38:36.969933 kubelet[2520]: I1002 20:38:36.969478 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xx5rx" podStartSLOduration=-9.223372019885332e+09 pod.CreationTimestamp="2023-10-02 20:38:20 +0000 UTC" firstStartedPulling="2023-10-02 20:38:21.191041331 +0000 UTC m=+22.723753463" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:36.966947438 +0000 UTC m=+38.499659570" watchObservedRunningTime="2023-10-02 20:38:36.969443359 +0000 UTC m=+38.502155491" Oct 2 20:38:36.992568 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.s2vEqW.mount: Deactivated successfully. Oct 2 20:38:37.809000 audit[3641]: AVC avc: denied { write } for pid=3641 comm="tee" name="fd" dev="proc" ino=24972 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.809000 audit[3641]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda74a961 a2=241 a3=1b6 items=1 ppid=3609 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.809000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:38:37.809000 audit: PATH item=0 name="/dev/fd/63" inode=24965 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.834000 audit[3644]: AVC avc: denied { write } for pid=3644 comm="tee" name="fd" dev="proc" ino=24984 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.834000 audit[3644]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc015971 a2=241 a3=1b6 items=1 ppid=3605 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.834000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:38:37.834000 audit: PATH item=0 name="/dev/fd/63" inode=24569 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.834000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.836000 audit[3646]: AVC avc: denied { write } for pid=3646 comm="tee" name="fd" dev="proc" ino=24988 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.836000 audit[3646]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8b3a962 a2=241 a3=1b6 items=1 ppid=3621 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.836000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:38:37.836000 audit: PATH item=0 name="/dev/fd/63" inode=24570 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.836000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.869000 audit[3673]: AVC avc: denied { write } for pid=3673 comm="tee" name="fd" dev="proc" ino=25002 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.874000 audit[3669]: AVC avc: denied { write } for pid=3669 comm="tee" name="fd" dev="proc" ino=25007 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.874000 audit[3669]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7e42971 a2=241 a3=1b6 items=1 ppid=3608 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.874000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:38:37.874000 audit: PATH item=0 name="/dev/fd/63" inode=24993 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.874000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.881000 audit[3671]: AVC avc: denied { write } for pid=3671 comm="tee" name="fd" dev="proc" ino=25022 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.881000 audit[3671]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1a4e971 a2=241 a3=1b6 items=1 ppid=3614 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.887000 audit[3678]: AVC avc: denied { write } for pid=3678 comm="tee" name="fd" dev="proc" ino=25026 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.887000 audit[3678]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff01e972 a2=241 a3=1b6 items=1 ppid=3616 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.887000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:38:37.887000 audit: PATH item=0 name="/dev/fd/63" inode=25004 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.887000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.869000 audit[3673]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5ad7973 a2=241 a3=1b6 items=1 ppid=3611 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.869000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:38:37.869000 audit: PATH item=0 name="/dev/fd/63" inode=24996 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.869000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.881000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:38:37.881000 audit: PATH item=0 name="/dev/fd/63" inode=25607 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.978283 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.NBHBOU.mount: Deactivated successfully. Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit: BPF prog-id=146 op=LOAD Oct 2 20:38:38.314000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3e04fc8 a2=70 a3=0 items=0 ppid=3619 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.314000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.314000 audit: BPF prog-id=146 op=UNLOAD Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit: BPF prog-id=147 op=LOAD Oct 2 20:38:38.314000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3e04fc8 a2=70 a3=4a174c items=0 ppid=3619 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.314000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.314000 audit: BPF prog-id=147 op=UNLOAD Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd3e04ff8 a2=70 a3=836479f items=0 ppid=3619 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.314000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.314000 audit: BPF prog-id=148 op=LOAD Oct 2 20:38:38.314000 audit[3769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd3e04f48 a2=70 a3=83647b9 items=0 ppid=3619 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.314000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.318000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.318000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd41818e8 a2=70 a3=0 items=0 ppid=3619 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.318000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.318000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd41817c8 a2=70 a3=2 items=0 ppid=3619 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.326000 audit: BPF prog-id=148 op=UNLOAD Oct 2 20:38:38.326000 audit[3773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32 a0=3 a1=ffffd2850b80 a2=0 a3=ffff96572fa0 items=0 ppid=3619 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.326000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Oct 2 20:38:38.473000 audit[3798]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.473000 audit[3798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffecf435a0 a2=0 a3=ffff8b3c7fa0 items=0 ppid=3619 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.495000 audit[3797]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=3797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.495000 audit[3797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffffa20d300 a2=0 a3=ffffa6f09fa0 items=0 ppid=3619 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.495000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.496000 audit[3795]: NETFILTER_CFG table=nat:116 family=2 entries=16 op=nft_register_chain pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.496000 audit[3795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffadc0b00 a2=0 a3=ffff93e37fa0 items=0 ppid=3619 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.496000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.497000 audit[3796]: NETFILTER_CFG table=filter:117 family=2 entries=39 op=nft_register_chain pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.497000 audit[3796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff9ebf3f0 a2=0 a3=ffff8b501fa0 items=0 ppid=3619 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:39.277324 systemd-networkd[1504]: vxlan.calico: Link UP Oct 2 20:38:39.277336 systemd-networkd[1504]: vxlan.calico: Gained carrier Oct 2 20:38:40.739780 systemd-networkd[1504]: vxlan.calico: Gained IPv6LL Oct 2 20:38:41.078689 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.5o1PQB.mount: Deactivated successfully. Oct 2 20:38:42.757036 env[1350]: time="2023-10-02T20:38:42.756989571Z" level=info msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.810 [INFO][3875] k8s.go 576: Cleaning up netns ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.810 [INFO][3875] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" iface="eth0" netns="/var/run/netns/cni-621058c6-52ef-d4b8-c909-38049b81c991" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.811 [INFO][3875] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" iface="eth0" netns="/var/run/netns/cni-621058c6-52ef-d4b8-c909-38049b81c991" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.811 [INFO][3875] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" iface="eth0" netns="/var/run/netns/cni-621058c6-52ef-d4b8-c909-38049b81c991" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.811 [INFO][3875] k8s.go 583: Releasing IP address(es) ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.811 [INFO][3875] utils.go 196: Calico CNI releasing IP address ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.836 [INFO][3881] ipam_plugin.go 416: Releasing address using handleID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:42.849844 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:42.849844 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.846 [WARNING][3881] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.846 [INFO][3881] ipam_plugin.go 444: Releasing address using workloadID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:42.849844 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:42.849844 env[1350]: 2023-10-02 20:38:42.848 [INFO][3875] k8s.go 589: Teardown processing complete. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:42.852422 env[1350]: time="2023-10-02T20:38:42.852060074Z" level=info msg="TearDown network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" successfully" Oct 2 20:38:42.852422 env[1350]: time="2023-10-02T20:38:42.852107394Z" level=info msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" returns successfully" Oct 2 20:38:42.851561 systemd[1]: run-netns-cni\x2d621058c6\x2d52ef\x2dd4b8\x2dc909\x2d38049b81c991.mount: Deactivated successfully. Oct 2 20:38:42.852947 env[1350]: time="2023-10-02T20:38:42.852906594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-dpnlr,Uid:109dfe35-73ee-4c74-8dcf-117ec6392f04,Namespace:kube-system,Attempt:1,}" Oct 2 20:38:43.014503 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:43.014639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif88b19a989f: link becomes ready Oct 2 20:38:43.022962 systemd-networkd[1504]: calif88b19a989f: Link UP Oct 2 20:38:43.022970 systemd-networkd[1504]: calif88b19a989f: Gained carrier Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.932 [INFO][3887] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0 coredns-787d4945fb- kube-system 109dfe35-73ee-4c74-8dcf-117ec6392f04 666 0 2023-10-02 20:38:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 coredns-787d4945fb-dpnlr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif88b19a989f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.932 [INFO][3887] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.964 [INFO][3899] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" HandleID="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.976 [INFO][3899] ipam_plugin.go 269: Auto assigning IP ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" HandleID="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000103080), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"coredns-787d4945fb-dpnlr", "timestamp":"2023-10-02 20:38:42.964163468 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:43.039829 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:43.039829 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.976 [INFO][3899] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.978 [INFO][3899] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.981 [INFO][3899] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.984 [INFO][3899] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.986 [INFO][3899] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.988 [INFO][3899] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.988 [INFO][3899] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.989 [INFO][3899] ipam.go 1682: Creating new handle: k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114 Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.992 [INFO][3899] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.997 [INFO][3899] ipam.go 1216: Successfully claimed IPs: [192.168.54.193/26] block=192.168.54.192/26 handle="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.997 [INFO][3899] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.193/26] handle="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:43.039829 env[1350]: time="2023-10-02T20:38:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:43.039829 env[1350]: 2023-10-02 20:38:42.997 [INFO][3899] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.193/26] IPv6=[] ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" HandleID="k8s-pod-network.db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:42.999 [INFO][3887] k8s.go 383: Populated endpoint ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"109dfe35-73ee-4c74-8dcf-117ec6392f04", ResourceVersion:"666", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"coredns-787d4945fb-dpnlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif88b19a989f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:42.999 [INFO][3887] k8s.go 384: Calico CNI using IPs: [192.168.54.193/32] ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:42.999 [INFO][3887] dataplane_linux.go 68: Setting the host side veth name to calif88b19a989f ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:43.015 [INFO][3887] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:43.023 [INFO][3887] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"109dfe35-73ee-4c74-8dcf-117ec6392f04", ResourceVersion:"666", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114", Pod:"coredns-787d4945fb-dpnlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif88b19a989f", MAC:"62:0f:60:a4:d0:f8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:43.040354 env[1350]: 2023-10-02 20:38:43.032 [INFO][3887] k8s.go 489: Wrote updated endpoint to datastore ContainerID="db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114" Namespace="kube-system" Pod="coredns-787d4945fb-dpnlr" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:43.064624 env[1350]: time="2023-10-02T20:38:43.064529334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:43.064750 env[1350]: time="2023-10-02T20:38:43.064630574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:43.064750 env[1350]: time="2023-10-02T20:38:43.064656854Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:43.064844 env[1350]: time="2023-10-02T20:38:43.064811694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114 pid=3930 runtime=io.containerd.runc.v2 Oct 2 20:38:43.070000 audit[3938]: NETFILTER_CFG table=filter:118 family=2 entries=36 op=nft_register_chain pid=3938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:43.077048 kernel: kauditd_printk_skb: 131 callbacks suppressed Oct 2 20:38:43.077163 kernel: audit: type=1325 audit(1696279123.070:1185): table=filter:118 family=2 entries=36 op=nft_register_chain pid=3938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:43.070000 audit[3938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc455f5f0 a2=0 a3=ffff897abfa0 items=0 ppid=3619 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.119623 kernel: audit: type=1300 audit(1696279123.070:1185): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc455f5f0 a2=0 a3=ffff897abfa0 items=0 ppid=3619 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.119791 kernel: audit: type=1327 audit(1696279123.070:1185): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:43.070000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:43.138848 systemd[1]: Started cri-containerd-db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114.scope. Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186713 kernel: audit: type=1400 audit(1696279123.152:1186): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186850 kernel: audit: type=1400 audit(1696279123.152:1187): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203373 kernel: audit: type=1400 audit(1696279123.152:1188): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203486 kernel: audit: type=1400 audit(1696279123.152:1189): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.237781 kernel: audit: type=1400 audit(1696279123.152:1190): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.237856 kernel: audit: type=1400 audit(1696279123.152:1191): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.274442 kernel: audit: type=1400 audit(1696279123.152:1192): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.170000 audit: BPF prog-id=149 op=LOAD Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3930 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462303432336531323164396235343831383566373364623531313066 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3930 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462303432336531323164396235343831383566373364623531313066 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.186000 audit: BPF prog-id=150 op=LOAD Oct 2 20:38:43.186000 audit[3942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3930 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462303432336531323164396235343831383566373364623531313066 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.203000 audit: BPF prog-id=151 op=LOAD Oct 2 20:38:43.203000 audit[3942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3930 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462303432336531323164396235343831383566373364623531313066 Oct 2 20:38:43.219000 audit: BPF prog-id=151 op=UNLOAD Oct 2 20:38:43.219000 audit: BPF prog-id=150 op=UNLOAD Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { perfmon } for pid=3942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.219000 audit: BPF prog-id=152 op=LOAD Oct 2 20:38:43.219000 audit[3942]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3930 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462303432336531323164396235343831383566373364623531313066 Oct 2 20:38:43.299437 env[1350]: time="2023-10-02T20:38:43.297594126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-dpnlr,Uid:109dfe35-73ee-4c74-8dcf-117ec6392f04,Namespace:kube-system,Attempt:1,} returns sandbox id \"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114\"" Oct 2 20:38:43.304658 env[1350]: time="2023-10-02T20:38:43.304209571Z" level=info msg="CreateContainer within sandbox \"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:43.337604 env[1350]: time="2023-10-02T20:38:43.337538792Z" level=info msg="CreateContainer within sandbox \"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3fb4827c47b14d28e4071f80adb680fa233c0042dcc78e7d479160b5790dd6f2\"" Oct 2 20:38:43.338254 env[1350]: time="2023-10-02T20:38:43.338220793Z" level=info msg="StartContainer for \"3fb4827c47b14d28e4071f80adb680fa233c0042dcc78e7d479160b5790dd6f2\"" Oct 2 20:38:43.358210 systemd[1]: Started cri-containerd-3fb4827c47b14d28e4071f80adb680fa233c0042dcc78e7d479160b5790dd6f2.scope. Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.380000 audit: BPF prog-id=153 op=LOAD Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3930 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623438323763343762313464323865343037316638306164623638 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3930 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623438323763343762313464323865343037316638306164623638 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit: BPF prog-id=154 op=LOAD Oct 2 20:38:43.381000 audit[3972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3930 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623438323763343762313464323865343037316638306164623638 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit: BPF prog-id=155 op=LOAD Oct 2 20:38:43.381000 audit[3972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3930 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623438323763343762313464323865343037316638306164623638 Oct 2 20:38:43.381000 audit: BPF prog-id=155 op=UNLOAD Oct 2 20:38:43.381000 audit: BPF prog-id=154 op=UNLOAD Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { perfmon } for pid=3972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit[3972]: AVC avc: denied { bpf } for pid=3972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.381000 audit: BPF prog-id=156 op=LOAD Oct 2 20:38:43.381000 audit[3972]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3930 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623438323763343762313464323865343037316638306164623638 Oct 2 20:38:43.409722 env[1350]: time="2023-10-02T20:38:43.409676319Z" level=info msg="StartContainer for \"3fb4827c47b14d28e4071f80adb680fa233c0042dcc78e7d479160b5790dd6f2\" returns successfully" Oct 2 20:38:43.755922 env[1350]: time="2023-10-02T20:38:43.755871946Z" level=info msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.805 [INFO][4017] k8s.go 576: Cleaning up netns ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.806 [INFO][4017] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" iface="eth0" netns="/var/run/netns/cni-972f388a-29e1-3658-e2e2-7d785c783e6b" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.806 [INFO][4017] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" iface="eth0" netns="/var/run/netns/cni-972f388a-29e1-3658-e2e2-7d785c783e6b" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.806 [INFO][4017] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" iface="eth0" netns="/var/run/netns/cni-972f388a-29e1-3658-e2e2-7d785c783e6b" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.806 [INFO][4017] k8s.go 583: Releasing IP address(es) ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.806 [INFO][4017] utils.go 196: Calico CNI releasing IP address ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.832 [INFO][4023] ipam_plugin.go 416: Releasing address using handleID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:43.845681 env[1350]: time="2023-10-02T20:38:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:43.845681 env[1350]: time="2023-10-02T20:38:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.842 [WARNING][4023] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.842 [INFO][4023] ipam_plugin.go 444: Releasing address using workloadID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:43.845681 env[1350]: time="2023-10-02T20:38:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:43.845681 env[1350]: 2023-10-02 20:38:43.844 [INFO][4017] k8s.go 589: Teardown processing complete. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:43.846275 env[1350]: time="2023-10-02T20:38:43.845824084Z" level=info msg="TearDown network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" successfully" Oct 2 20:38:43.846275 env[1350]: time="2023-10-02T20:38:43.845855084Z" level=info msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" returns successfully" Oct 2 20:38:43.846507 env[1350]: time="2023-10-02T20:38:43.846482365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kk5x4,Uid:f80acaac-1174-4751-8af1-1b7ba97c4d9f,Namespace:calico-system,Attempt:1,}" Oct 2 20:38:43.852249 systemd[1]: run-containerd-runc-k8s.io-db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114-runc.lZPB9p.mount: Deactivated successfully. Oct 2 20:38:43.852333 systemd[1]: run-netns-cni\x2d972f388a\x2d29e1\x2d3658\x2de2e2\x2d7d785c783e6b.mount: Deactivated successfully. Oct 2 20:38:44.002819 kubelet[2520]: I1002 20:38:44.002781 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-dpnlr" podStartSLOduration=30.002744627 pod.CreationTimestamp="2023-10-02 20:38:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:43.978293971 +0000 UTC m=+45.511006063" watchObservedRunningTime="2023-10-02 20:38:44.002744627 +0000 UTC m=+45.535456759" Oct 2 20:38:44.027068 systemd-networkd[1504]: cali838b521b884: Link UP Oct 2 20:38:44.037006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali838b521b884: link becomes ready Oct 2 20:38:44.036481 systemd-networkd[1504]: cali838b521b884: Gained carrier Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.919 [INFO][4029] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0 csi-node-driver- calico-system f80acaac-1174-4751-8af1-1b7ba97c4d9f 677 0 2023-10-02 20:38:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 csi-node-driver-kk5x4 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali838b521b884 [] []}} ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.919 [INFO][4029] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.948 [INFO][4042] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" HandleID="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.959 [INFO][4042] ipam_plugin.go 269: Auto assigning IP ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" HandleID="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001030b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"csi-node-driver-kk5x4", "timestamp":"2023-10-02 20:38:43.948544751 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:44.047113 env[1350]: time="2023-10-02T20:38:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:44.047113 env[1350]: time="2023-10-02T20:38:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.960 [INFO][4042] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.961 [INFO][4042] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.974 [INFO][4042] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.989 [INFO][4042] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.991 [INFO][4042] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.994 [INFO][4042] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.994 [INFO][4042] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:43.995 [INFO][4042] ipam.go 1682: Creating new handle: k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3 Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:44.000 [INFO][4042] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:44.017 [INFO][4042] ipam.go 1216: Successfully claimed IPs: [192.168.54.194/26] block=192.168.54.192/26 handle="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:44.017 [INFO][4042] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.194/26] handle="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:44.047113 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:44.047113 env[1350]: 2023-10-02 20:38:44.017 [INFO][4042] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.194/26] IPv6=[] ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" HandleID="k8s-pod-network.5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.018 [INFO][4029] k8s.go 383: Populated endpoint ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f80acaac-1174-4751-8af1-1b7ba97c4d9f", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"csi-node-driver-kk5x4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali838b521b884", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.018 [INFO][4029] k8s.go 384: Calico CNI using IPs: [192.168.54.194/32] ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.018 [INFO][4029] dataplane_linux.go 68: Setting the host side veth name to cali838b521b884 ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.019 [INFO][4029] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.037 [INFO][4029] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f80acaac-1174-4751-8af1-1b7ba97c4d9f", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3", Pod:"csi-node-driver-kk5x4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali838b521b884", MAC:"3a:ba:15:92:1b:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:44.047742 env[1350]: 2023-10-02 20:38:44.045 [INFO][4029] k8s.go 489: Wrote updated endpoint to datastore ContainerID="5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3" Namespace="calico-system" Pod="csi-node-driver-kk5x4" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:44.074881 env[1350]: time="2023-10-02T20:38:44.074813953Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:44.075085 env[1350]: time="2023-10-02T20:38:44.075056593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:44.075174 env[1350]: time="2023-10-02T20:38:44.075152873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:44.075418 env[1350]: time="2023-10-02T20:38:44.075385514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3 pid=4078 runtime=io.containerd.runc.v2 Oct 2 20:38:44.097154 systemd[1]: Started cri-containerd-5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3.scope. Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.128000 audit: BPF prog-id=157 op=LOAD Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4078 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303036343161656131663562666462636665626433633264633665 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4078 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303036343161656131663562666462636665626433633264633665 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.129000 audit: BPF prog-id=158 op=LOAD Oct 2 20:38:44.129000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4078 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303036343161656131663562666462636665626433633264633665 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit: BPF prog-id=159 op=LOAD Oct 2 20:38:44.130000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4078 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303036343161656131663562666462636665626433633264633665 Oct 2 20:38:44.130000 audit: BPF prog-id=159 op=UNLOAD Oct 2 20:38:44.130000 audit: BPF prog-id=158 op=UNLOAD Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { perfmon } for pid=4094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit[4094]: AVC avc: denied { bpf } for pid=4094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.130000 audit: BPF prog-id=160 op=LOAD Oct 2 20:38:44.130000 audit[4094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4078 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303036343161656131663562666462636665626433633264633665 Oct 2 20:38:44.131000 audit[4111]: NETFILTER_CFG table=filter:119 family=2 entries=40 op=nft_register_chain pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:44.131000 audit[4111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffff1400ee0 a2=0 a3=ffffa2edcfa0 items=0 ppid=3619 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.131000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:44.143000 audit[4132]: NETFILTER_CFG table=filter:120 family=2 entries=12 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:44.143000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffff35092b0 a2=0 a3=ffff8fbaa6c0 items=0 ppid=2675 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:44.147073 env[1350]: time="2023-10-02T20:38:44.147042400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kk5x4,Uid:f80acaac-1174-4751-8af1-1b7ba97c4d9f,Namespace:calico-system,Attempt:1,} returns sandbox id \"5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3\"" Oct 2 20:38:44.146000 audit[4132]: NETFILTER_CFG table=nat:121 family=2 entries=30 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:44.146000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffff35092b0 a2=0 a3=ffff8fbaa6c0 items=0 ppid=2675 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:44.150856 env[1350]: time="2023-10-02T20:38:44.150827122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:38:44.192000 audit[4158]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:44.192000 audit[4158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffe7f09b0 a2=0 a3=ffffa0a1c6c0 items=0 ppid=2675 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:44.194000 audit[4158]: NETFILTER_CFG table=nat:123 family=2 entries=51 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:44.194000 audit[4158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffffe7f09b0 a2=0 a3=ffffa0a1c6c0 items=0 ppid=2675 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:44.301008 env[1350]: time="2023-10-02T20:38:44.300844539Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:44.304654 env[1350]: time="2023-10-02T20:38:44.304600021Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:44.304853 kubelet[2520]: E1002 20:38:44.304828 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:44.304916 kubelet[2520]: E1002 20:38:44.304873 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:44.305238 kubelet[2520]: E1002 20:38:44.304989 2520 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:44.306120 env[1350]: time="2023-10-02T20:38:44.306088702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:38:44.478575 env[1350]: time="2023-10-02T20:38:44.478502174Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:44.483533 env[1350]: time="2023-10-02T20:38:44.483481817Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:44.484369 kubelet[2520]: E1002 20:38:44.483903 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:44.484369 kubelet[2520]: E1002 20:38:44.483941 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:44.484369 kubelet[2520]: E1002 20:38:44.484055 2520 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:44.484369 kubelet[2520]: E1002 20:38:44.484330 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:44.757291 env[1350]: time="2023-10-02T20:38:44.757254193Z" level=info msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" Oct 2 20:38:44.771689 systemd-networkd[1504]: calif88b19a989f: Gained IPv6LL Oct 2 20:38:44.851683 systemd[1]: run-containerd-runc-k8s.io-5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3-runc.uRYC02.mount: Deactivated successfully. Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.810 [INFO][4176] k8s.go 576: Cleaning up netns ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.811 [INFO][4176] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" iface="eth0" netns="/var/run/netns/cni-23e16619-4eff-d7b5-89f4-4802d062036e" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.812 [INFO][4176] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" iface="eth0" netns="/var/run/netns/cni-23e16619-4eff-d7b5-89f4-4802d062036e" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.812 [INFO][4176] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" iface="eth0" netns="/var/run/netns/cni-23e16619-4eff-d7b5-89f4-4802d062036e" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.812 [INFO][4176] k8s.go 583: Releasing IP address(es) ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.812 [INFO][4176] utils.go 196: Calico CNI releasing IP address ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.838 [INFO][4182] ipam_plugin.go 416: Releasing address using handleID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:44.853323 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:44.853323 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.847 [WARNING][4182] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.847 [INFO][4182] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:44.853323 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:44.853323 env[1350]: 2023-10-02 20:38:44.849 [INFO][4176] k8s.go 589: Teardown processing complete. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:44.855502 systemd[1]: run-netns-cni\x2d23e16619\x2d4eff\x2dd7b5\x2d89f4\x2d4802d062036e.mount: Deactivated successfully. Oct 2 20:38:44.856457 env[1350]: time="2023-10-02T20:38:44.856116537Z" level=info msg="TearDown network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" successfully" Oct 2 20:38:44.856457 env[1350]: time="2023-10-02T20:38:44.856153497Z" level=info msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" returns successfully" Oct 2 20:38:44.857045 env[1350]: time="2023-10-02T20:38:44.857019898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-sw4vd,Uid:741b46f9-6473-4feb-b347-0df9b87013ae,Namespace:calico-system,Attempt:1,}" Oct 2 20:38:44.977715 kubelet[2520]: E1002 20:38:44.977667 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:45.021696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7dff87c2b77: link becomes ready Oct 2 20:38:45.035687 systemd-networkd[1504]: cali7dff87c2b77: Link UP Oct 2 20:38:45.039849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7dff87c2b77: link becomes ready Oct 2 20:38:45.039966 systemd-networkd[1504]: cali7dff87c2b77: Gained carrier Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.935 [INFO][4190] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0 calico-kube-controllers-69c848ddc6- calico-system 741b46f9-6473-4feb-b347-0df9b87013ae 698 0 2023-10-02 20:38:20 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 calico-kube-controllers-69c848ddc6-sw4vd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7dff87c2b77 [] []}} ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.935 [INFO][4190] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.965 [INFO][4200] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" HandleID="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.987 [INFO][4200] ipam_plugin.go 269: Auto assigning IP ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" HandleID="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005232c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"calico-kube-controllers-69c848ddc6-sw4vd", "timestamp":"2023-10-02 20:38:44.965598848 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:45.050416 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:45.050416 env[1350]: time="2023-10-02T20:38:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.987 [INFO][4200] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.991 [INFO][4200] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.995 [INFO][4200] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:44.999 [INFO][4200] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.000 [INFO][4200] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.002 [INFO][4200] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.002 [INFO][4200] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.004 [INFO][4200] ipam.go 1682: Creating new handle: k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91 Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.007 [INFO][4200] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.011 [INFO][4200] ipam.go 1216: Successfully claimed IPs: [192.168.54.195/26] block=192.168.54.192/26 handle="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.011 [INFO][4200] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.195/26] handle="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:45.050416 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:45.050416 env[1350]: 2023-10-02 20:38:45.011 [INFO][4200] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.195/26] IPv6=[] ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" HandleID="k8s-pod-network.bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.013 [INFO][4190] k8s.go 383: Populated endpoint ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"741b46f9-6473-4feb-b347-0df9b87013ae", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-sw4vd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7dff87c2b77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.013 [INFO][4190] k8s.go 384: Calico CNI using IPs: [192.168.54.195/32] ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.013 [INFO][4190] dataplane_linux.go 68: Setting the host side veth name to cali7dff87c2b77 ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.022 [INFO][4190] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.040 [INFO][4190] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"741b46f9-6473-4feb-b347-0df9b87013ae", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91", Pod:"calico-kube-controllers-69c848ddc6-sw4vd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7dff87c2b77", MAC:"7e:97:b5:46:35:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:45.051549 env[1350]: 2023-10-02 20:38:45.048 [INFO][4190] k8s.go 489: Wrote updated endpoint to datastore ContainerID="bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-sw4vd" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:45.083636 env[1350]: time="2023-10-02T20:38:45.083465523Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:45.083636 env[1350]: time="2023-10-02T20:38:45.083510483Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:45.083636 env[1350]: time="2023-10-02T20:38:45.083520363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:45.083837 env[1350]: time="2023-10-02T20:38:45.083658683Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91 pid=4227 runtime=io.containerd.runc.v2 Oct 2 20:38:45.083000 audit[4232]: NETFILTER_CFG table=filter:124 family=2 entries=38 op=nft_register_chain pid=4232 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:45.083000 audit[4232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19508 a0=3 a1=ffffe41279f0 a2=0 a3=ffff8d89cfa0 items=0 ppid=3619 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.083000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:45.104168 systemd[1]: Started cri-containerd-bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91.scope. Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.123000 audit: BPF prog-id=161 op=LOAD Oct 2 20:38:45.124000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.124000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4227 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393434323365306237613736653761623833313037616665376266 Oct 2 20:38:45.124000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.124000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4227 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393434323365306237613736653761623833313037616665376266 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.125000 audit: BPF prog-id=162 op=LOAD Oct 2 20:38:45.125000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4227 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393434323365306237613736653761623833313037616665376266 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit: BPF prog-id=163 op=LOAD Oct 2 20:38:45.126000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4227 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393434323365306237613736653761623833313037616665376266 Oct 2 20:38:45.126000 audit: BPF prog-id=163 op=UNLOAD Oct 2 20:38:45.126000 audit: BPF prog-id=162 op=UNLOAD Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.126000 audit: BPF prog-id=164 op=LOAD Oct 2 20:38:45.126000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4227 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393434323365306237613736653761623833313037616665376266 Oct 2 20:38:45.150005 env[1350]: time="2023-10-02T20:38:45.149956445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-sw4vd,Uid:741b46f9-6473-4feb-b347-0df9b87013ae,Namespace:calico-system,Attempt:1,} returns sandbox id \"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91\"" Oct 2 20:38:45.156773 systemd-networkd[1504]: cali838b521b884: Gained IPv6LL Oct 2 20:38:45.157791 env[1350]: time="2023-10-02T20:38:45.157738450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 20:38:45.755941 env[1350]: time="2023-10-02T20:38:45.755894551Z" level=info msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] k8s.go 576: Cleaning up netns ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" iface="eth0" netns="/var/run/netns/cni-5edcc087-3d6e-fa84-8870-c0094929d280" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" iface="eth0" netns="/var/run/netns/cni-5edcc087-3d6e-fa84-8870-c0094929d280" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" iface="eth0" netns="/var/run/netns/cni-5edcc087-3d6e-fa84-8870-c0094929d280" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] k8s.go 583: Releasing IP address(es) ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.804 [INFO][4274] utils.go 196: Calico CNI releasing IP address ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.833 [INFO][4280] ipam_plugin.go 416: Releasing address using handleID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:45.847444 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:45.847444 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.843 [WARNING][4280] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.843 [INFO][4280] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:45.847444 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:45.847444 env[1350]: 2023-10-02 20:38:45.846 [INFO][4274] k8s.go 589: Teardown processing complete. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:45.847918 env[1350]: time="2023-10-02T20:38:45.847663210Z" level=info msg="TearDown network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" successfully" Oct 2 20:38:45.847918 env[1350]: time="2023-10-02T20:38:45.847741410Z" level=info msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" returns successfully" Oct 2 20:38:45.848531 env[1350]: time="2023-10-02T20:38:45.848503610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m9qtj,Uid:42618cda-fafb-4a24-a677-1f95c0382d4b,Namespace:kube-system,Attempt:1,}" Oct 2 20:38:45.851680 systemd[1]: run-netns-cni\x2d5edcc087\x2d3d6e\x2dfa84\x2d8870\x2dc0094929d280.mount: Deactivated successfully. Oct 2 20:38:45.990517 kubelet[2520]: E1002 20:38:45.988243 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:46.023341 systemd-networkd[1504]: calid9c25de40b0: Link UP Oct 2 20:38:46.023351 systemd-networkd[1504]: calid9c25de40b0: Gained carrier Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.932 [INFO][4287] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0 coredns-787d4945fb- kube-system 42618cda-fafb-4a24-a677-1f95c0382d4b 710 0 2023-10-02 20:38:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 coredns-787d4945fb-m9qtj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid9c25de40b0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.933 [INFO][4287] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.963 [INFO][4298] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" HandleID="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.975 [INFO][4298] ipam_plugin.go 269: Auto assigning IP ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" HandleID="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d610), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"coredns-787d4945fb-m9qtj", "timestamp":"2023-10-02 20:38:45.963296723 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:46.038613 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:46.038613 env[1350]: time="2023-10-02T20:38:45Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.975 [INFO][4298] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.978 [INFO][4298] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.991 [INFO][4298] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:45.998 [INFO][4298] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.001 [INFO][4298] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.003 [INFO][4298] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.003 [INFO][4298] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.004 [INFO][4298] ipam.go 1682: Creating new handle: k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6 Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.011 [INFO][4298] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.015 [INFO][4298] ipam.go 1216: Successfully claimed IPs: [192.168.54.196/26] block=192.168.54.192/26 handle="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.015 [INFO][4298] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.196/26] handle="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:46.038613 env[1350]: time="2023-10-02T20:38:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:46.038613 env[1350]: 2023-10-02 20:38:46.015 [INFO][4298] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.196/26] IPv6=[] ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" HandleID="k8s-pod-network.0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.017 [INFO][4287] k8s.go 383: Populated endpoint ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"42618cda-fafb-4a24-a677-1f95c0382d4b", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"coredns-787d4945fb-m9qtj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9c25de40b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.017 [INFO][4287] k8s.go 384: Calico CNI using IPs: [192.168.54.196/32] ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.017 [INFO][4287] dataplane_linux.go 68: Setting the host side veth name to calid9c25de40b0 ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.018 [INFO][4287] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.023 [INFO][4287] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"42618cda-fafb-4a24-a677-1f95c0382d4b", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6", Pod:"coredns-787d4945fb-m9qtj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9c25de40b0", MAC:"6a:2a:20:d8:5d:9a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:46.039427 env[1350]: 2023-10-02 20:38:46.035 [INFO][4287] k8s.go 489: Wrote updated endpoint to datastore ContainerID="0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6" Namespace="kube-system" Pod="coredns-787d4945fb-m9qtj" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:46.066503 env[1350]: time="2023-10-02T20:38:46.066422108Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:46.066503 env[1350]: time="2023-10-02T20:38:46.066465428Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:46.066503 env[1350]: time="2023-10-02T20:38:46.066476068Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:46.066990 env[1350]: time="2023-10-02T20:38:46.066910109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6 pid=4324 runtime=io.containerd.runc.v2 Oct 2 20:38:46.071000 audit[4323]: NETFILTER_CFG table=filter:125 family=2 entries=38 op=nft_register_chain pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:46.071000 audit[4323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=fffff038b070 a2=0 a3=ffff8d8e1fa0 items=0 ppid=3619 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.071000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:46.090919 systemd[1]: Started cri-containerd-0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6.scope. Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.107000 audit: BPF prog-id=165 op=LOAD Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353465383730323061313361313435376337313336353433653632 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353465383730323061313361313435376337313336353433653632 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit: BPF prog-id=166 op=LOAD Oct 2 20:38:46.108000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353465383730323061313361313435376337313336353433653632 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit: BPF prog-id=167 op=LOAD Oct 2 20:38:46.108000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353465383730323061313361313435376337313336353433653632 Oct 2 20:38:46.108000 audit: BPF prog-id=167 op=UNLOAD Oct 2 20:38:46.108000 audit: BPF prog-id=166 op=UNLOAD Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.108000 audit: BPF prog-id=168 op=LOAD Oct 2 20:38:46.108000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353465383730323061313361313435376337313336353433653632 Oct 2 20:38:46.134535 env[1350]: time="2023-10-02T20:38:46.134499951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m9qtj,Uid:42618cda-fafb-4a24-a677-1f95c0382d4b,Namespace:kube-system,Attempt:1,} returns sandbox id \"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6\"" Oct 2 20:38:46.138127 env[1350]: time="2023-10-02T20:38:46.138056393Z" level=info msg="CreateContainer within sandbox \"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:46.169541 env[1350]: time="2023-10-02T20:38:46.169495493Z" level=info msg="CreateContainer within sandbox \"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3ba2edce38009472796f9eba49112710eae94bf4a7d8f04a5505b3c06f1a000a\"" Oct 2 20:38:46.171732 env[1350]: time="2023-10-02T20:38:46.170301894Z" level=info msg="StartContainer for \"3ba2edce38009472796f9eba49112710eae94bf4a7d8f04a5505b3c06f1a000a\"" Oct 2 20:38:46.188913 systemd[1]: Started cri-containerd-3ba2edce38009472796f9eba49112710eae94bf4a7d8f04a5505b3c06f1a000a.scope. Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit: BPF prog-id=169 op=LOAD Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4324 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613265646365333830303934373237393666396562613439313132 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4324 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613265646365333830303934373237393666396562613439313132 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit: BPF prog-id=170 op=LOAD Oct 2 20:38:46.205000 audit[4367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4324 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613265646365333830303934373237393666396562613439313132 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit: BPF prog-id=171 op=LOAD Oct 2 20:38:46.205000 audit[4367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4324 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613265646365333830303934373237393666396562613439313132 Oct 2 20:38:46.205000 audit: BPF prog-id=171 op=UNLOAD Oct 2 20:38:46.205000 audit: BPF prog-id=170 op=UNLOAD Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:46.205000 audit: BPF prog-id=172 op=LOAD Oct 2 20:38:46.205000 audit[4367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4324 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362613265646365333830303934373237393666396562613439313132 Oct 2 20:38:46.231596 env[1350]: time="2023-10-02T20:38:46.231538172Z" level=info msg="StartContainer for \"3ba2edce38009472796f9eba49112710eae94bf4a7d8f04a5505b3c06f1a000a\" returns successfully" Oct 2 20:38:46.435715 systemd-networkd[1504]: cali7dff87c2b77: Gained IPv6LL Oct 2 20:38:46.852588 systemd[1]: run-containerd-runc-k8s.io-0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6-runc.E7vQOM.mount: Deactivated successfully. Oct 2 20:38:46.999106 env[1350]: time="2023-10-02T20:38:46.999065695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:47.005370 env[1350]: time="2023-10-02T20:38:47.005313659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:47.010452 kubelet[2520]: I1002 20:38:47.010395 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-m9qtj" podStartSLOduration=33.010344902 pod.CreationTimestamp="2023-10-02 20:38:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:46.99209725 +0000 UTC m=+48.524809382" watchObservedRunningTime="2023-10-02 20:38:47.010344902 +0000 UTC m=+48.543057034" Oct 2 20:38:47.011026 env[1350]: time="2023-10-02T20:38:47.010989302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:47.016903 env[1350]: time="2023-10-02T20:38:47.016855506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:47.017499 env[1350]: time="2023-10-02T20:38:47.017458266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 20:38:47.019713 env[1350]: time="2023-10-02T20:38:47.019676108Z" level=info msg="CreateContainer within sandbox \"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 20:38:47.048246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3850715664.mount: Deactivated successfully. Oct 2 20:38:47.056675 env[1350]: time="2023-10-02T20:38:47.056624371Z" level=info msg="CreateContainer within sandbox \"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf\"" Oct 2 20:38:47.057458 env[1350]: time="2023-10-02T20:38:47.057434411Z" level=info msg="StartContainer for \"8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf\"" Oct 2 20:38:47.075000 audit[4439]: NETFILTER_CFG table=filter:126 family=2 entries=6 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:47.075000 audit[4439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff3f277a0 a2=0 a3=ffff867286c0 items=0 ppid=2675 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:47.077000 audit[4439]: NETFILTER_CFG table=nat:127 family=2 entries=60 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:47.077000 audit[4439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffff3f277a0 a2=0 a3=ffff867286c0 items=0 ppid=2675 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:47.083928 systemd[1]: Started cri-containerd-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf.scope. Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.099000 audit: BPF prog-id=173 op=LOAD Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4227 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303565343638343232646437613834353832663562323836346266 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4227 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303565343638343232646437613834353832663562323836346266 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit: BPF prog-id=174 op=LOAD Oct 2 20:38:47.100000 audit[4433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4227 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303565343638343232646437613834353832663562323836346266 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit: BPF prog-id=175 op=LOAD Oct 2 20:38:47.100000 audit[4433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4227 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303565343638343232646437613834353832663562323836346266 Oct 2 20:38:47.100000 audit: BPF prog-id=175 op=UNLOAD Oct 2 20:38:47.100000 audit: BPF prog-id=174 op=UNLOAD Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.100000 audit: BPF prog-id=176 op=LOAD Oct 2 20:38:47.100000 audit[4433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4227 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839303565343638343232646437613834353832663562323836346266 Oct 2 20:38:47.129797 env[1350]: time="2023-10-02T20:38:47.129693736Z" level=info msg="StartContainer for \"8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf\" returns successfully" Oct 2 20:38:47.158000 audit[4489]: NETFILTER_CFG table=filter:128 family=2 entries=6 op=nft_register_rule pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:47.158000 audit[4489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd4958a10 a2=0 a3=ffffafe826c0 items=0 ppid=2675 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:47.177000 audit[4489]: NETFILTER_CFG table=nat:129 family=2 entries=72 op=nft_register_chain pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:47.177000 audit[4489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd4958a10 a2=0 a3=ffffafe826c0 items=0 ppid=2675 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:47.331851 systemd-networkd[1504]: calid9c25de40b0: Gained IPv6LL Oct 2 20:38:47.996058 kubelet[2520]: I1002 20:38:47.996009 2520 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-sw4vd" podStartSLOduration=-9.223372008858805e+09 pod.CreationTimestamp="2023-10-02 20:38:20 +0000 UTC" firstStartedPulling="2023-10-02 20:38:45.15734593 +0000 UTC m=+46.690058062" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:47.994609473 +0000 UTC m=+49.527321605" watchObservedRunningTime="2023-10-02 20:38:47.995970954 +0000 UTC m=+49.528683086" Oct 2 20:38:48.010168 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.1IzoX7.mount: Deactivated successfully. Oct 2 20:38:48.972274 kubelet[2520]: I1002 20:38:48.971448 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:48.972274 kubelet[2520]: I1002 20:38:48.972263 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d04d6efc-69f7-4909-a546-23e6e8bb621e-calico-apiserver-certs\") pod \"calico-apiserver-7dc7577b7f-9rtpx\" (UID: \"d04d6efc-69f7-4909-a546-23e6e8bb621e\") " pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" Oct 2 20:38:48.972660 kubelet[2520]: I1002 20:38:48.972297 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wfr8m\" (UniqueName: \"kubernetes.io/projected/d04d6efc-69f7-4909-a546-23e6e8bb621e-kube-api-access-wfr8m\") pod \"calico-apiserver-7dc7577b7f-9rtpx\" (UID: \"d04d6efc-69f7-4909-a546-23e6e8bb621e\") " pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" Oct 2 20:38:48.976872 systemd[1]: Created slice kubepods-besteffort-podd04d6efc_69f7_4909_a546_23e6e8bb621e.slice. Oct 2 20:38:48.984056 kubelet[2520]: I1002 20:38:48.984019 2520 topology_manager.go:210] "Topology Admit Handler" Oct 2 20:38:48.989268 systemd[1]: Created slice kubepods-besteffort-pod289f1a6e_3689_40ce_9443_3f8798dfd3ff.slice. Oct 2 20:38:49.060000 audit[4541]: NETFILTER_CFG table=filter:130 family=2 entries=6 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.066227 kernel: kauditd_printk_skb: 425 callbacks suppressed Oct 2 20:38:49.066403 kernel: audit: type=1325 audit(1696279129.060:1323): table=filter:130 family=2 entries=6 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.073980 kubelet[2520]: E1002 20:38:49.073937 2520 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 20:38:49.074227 kubelet[2520]: E1002 20:38:49.074206 2520 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d04d6efc-69f7-4909-a546-23e6e8bb621e-calico-apiserver-certs podName:d04d6efc-69f7-4909-a546-23e6e8bb621e nodeName:}" failed. No retries permitted until 2023-10-02 20:38:49.574185696 +0000 UTC m=+51.106897828 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d04d6efc-69f7-4909-a546-23e6e8bb621e-calico-apiserver-certs") pod "calico-apiserver-7dc7577b7f-9rtpx" (UID: "d04d6efc-69f7-4909-a546-23e6e8bb621e") : secret "calico-apiserver-certs" not found Oct 2 20:38:49.060000 audit[4541]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffee5ecb70 a2=0 a3=ffffa87436c0 items=0 ppid=2675 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.107833 kernel: audit: type=1300 audit(1696279129.060:1323): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffee5ecb70 a2=0 a3=ffffa87436c0 items=0 ppid=2675 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.120742 kernel: audit: type=1327 audit(1696279129.060:1323): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.062000 audit[4541]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.141915 kernel: audit: type=1325 audit(1696279129.062:1324): table=nat:131 family=2 entries=78 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.062000 audit[4541]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffee5ecb70 a2=0 a3=ffffa87436c0 items=0 ppid=2675 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.169393 kernel: audit: type=1300 audit(1696279129.062:1324): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffee5ecb70 a2=0 a3=ffffa87436c0 items=0 ppid=2675 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.174049 kubelet[2520]: I1002 20:38:49.174023 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/289f1a6e-3689-40ce-9443-3f8798dfd3ff-calico-apiserver-certs\") pod \"calico-apiserver-7dc7577b7f-n2xtl\" (UID: \"289f1a6e-3689-40ce-9443-3f8798dfd3ff\") " pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" Oct 2 20:38:49.174254 kubelet[2520]: I1002 20:38:49.174242 2520 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qpb9w\" (UniqueName: \"kubernetes.io/projected/289f1a6e-3689-40ce-9443-3f8798dfd3ff-kube-api-access-qpb9w\") pod \"calico-apiserver-7dc7577b7f-n2xtl\" (UID: \"289f1a6e-3689-40ce-9443-3f8798dfd3ff\") " pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" Oct 2 20:38:49.183198 kernel: audit: type=1327 audit(1696279129.062:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.189000 audit[4568]: NETFILTER_CFG table=filter:132 family=2 entries=7 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.189000 audit[4568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff9a82030 a2=0 a3=ffff872cd6c0 items=0 ppid=2675 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.230793 kernel: audit: type=1325 audit(1696279129.189:1325): table=filter:132 family=2 entries=7 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.230957 kernel: audit: type=1300 audit(1696279129.189:1325): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff9a82030 a2=0 a3=ffff872cd6c0 items=0 ppid=2675 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.231001 kernel: audit: type=1327 audit(1696279129.189:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.192000 audit[4568]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.192000 audit[4568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff9a82030 a2=0 a3=ffff872cd6c0 items=0 ppid=2675 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.261620 kernel: audit: type=1325 audit(1696279129.192:1326): table=nat:133 family=2 entries=78 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:49.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:49.593188 env[1350]: time="2023-10-02T20:38:49.592718610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7577b7f-n2xtl,Uid:289f1a6e-3689-40ce-9443-3f8798dfd3ff,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:49.749820 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:49.749959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0a2f04d735: link becomes ready Oct 2 20:38:49.759923 systemd-networkd[1504]: calif0a2f04d735: Link UP Oct 2 20:38:49.759932 systemd-networkd[1504]: calif0a2f04d735: Gained carrier Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.668 [INFO][4573] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0 calico-apiserver-7dc7577b7f- calico-apiserver 289f1a6e-3689-40ce-9443-3f8798dfd3ff 795 0 2023-10-02 20:38:48 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dc7577b7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 calico-apiserver-7dc7577b7f-n2xtl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif0a2f04d735 [] []}} ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.669 [INFO][4573] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.701 [INFO][4583] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" HandleID="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.713 [INFO][4583] ipam_plugin.go 269: Auto assigning IP ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" HandleID="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d680), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"calico-apiserver-7dc7577b7f-n2xtl", "timestamp":"2023-10-02 20:38:49.701196756 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:49.770904 env[1350]: time="2023-10-02T20:38:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:49.770904 env[1350]: time="2023-10-02T20:38:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.713 [INFO][4583] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.715 [INFO][4583] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.718 [INFO][4583] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.721 [INFO][4583] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.723 [INFO][4583] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.725 [INFO][4583] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.725 [INFO][4583] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.726 [INFO][4583] ipam.go 1682: Creating new handle: k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.730 [INFO][4583] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.735 [INFO][4583] ipam.go 1216: Successfully claimed IPs: [192.168.54.197/26] block=192.168.54.192/26 handle="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.735 [INFO][4583] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.197/26] handle="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:49.770904 env[1350]: time="2023-10-02T20:38:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:49.770904 env[1350]: 2023-10-02 20:38:49.735 [INFO][4583] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.197/26] IPv6=[] ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" HandleID="k8s-pod-network.2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.736 [INFO][4573] k8s.go 383: Populated endpoint ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0", GenerateName:"calico-apiserver-7dc7577b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"289f1a6e-3689-40ce-9443-3f8798dfd3ff", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7577b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"calico-apiserver-7dc7577b7f-n2xtl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0a2f04d735", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.737 [INFO][4573] k8s.go 384: Calico CNI using IPs: [192.168.54.197/32] ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.737 [INFO][4573] dataplane_linux.go 68: Setting the host side veth name to calif0a2f04d735 ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.750 [INFO][4573] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.759 [INFO][4573] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0", GenerateName:"calico-apiserver-7dc7577b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"289f1a6e-3689-40ce-9443-3f8798dfd3ff", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7577b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc", Pod:"calico-apiserver-7dc7577b7f-n2xtl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0a2f04d735", MAC:"82:84:18:d9:45:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:49.771458 env[1350]: 2023-10-02 20:38:49.769 [INFO][4573] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-n2xtl" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--n2xtl-eth0" Oct 2 20:38:49.797230 env[1350]: time="2023-10-02T20:38:49.797051694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:49.797230 env[1350]: time="2023-10-02T20:38:49.797089174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:49.797230 env[1350]: time="2023-10-02T20:38:49.797099334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:49.797489 env[1350]: time="2023-10-02T20:38:49.797460734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc pid=4612 runtime=io.containerd.runc.v2 Oct 2 20:38:49.812509 systemd[1]: Started cri-containerd-2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc.scope. Oct 2 20:38:49.824000 audit[4632]: NETFILTER_CFG table=filter:134 family=2 entries=65 op=nft_register_chain pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:49.824000 audit[4632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32144 a0=3 a1=ffffcbff21e0 a2=0 a3=ffff92410fa0 items=0 ppid=3619 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.831000 audit: BPF prog-id=177 op=LOAD Oct 2 20:38:49.832000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.832000 audit[4622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4612 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393737333738323965313138316662633262323330613430613963 Oct 2 20:38:49.832000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.832000 audit[4622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4612 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393737333738323965313138316662633262323330613430613963 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit: BPF prog-id=178 op=LOAD Oct 2 20:38:49.833000 audit[4622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4612 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393737333738323965313138316662633262323330613430613963 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.833000 audit: BPF prog-id=179 op=LOAD Oct 2 20:38:49.833000 audit[4622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4612 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393737333738323965313138316662633262323330613430613963 Oct 2 20:38:49.834000 audit: BPF prog-id=179 op=UNLOAD Oct 2 20:38:49.834000 audit: BPF prog-id=178 op=UNLOAD Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { perfmon } for pid=4622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit[4622]: AVC avc: denied { bpf } for pid=4622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:49.834000 audit: BPF prog-id=180 op=LOAD Oct 2 20:38:49.834000 audit[4622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4612 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:49.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393737333738323965313138316662633262323330613430613963 Oct 2 20:38:49.867322 env[1350]: time="2023-10-02T20:38:49.867217297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7577b7f-n2xtl,Uid:289f1a6e-3689-40ce-9443-3f8798dfd3ff,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2e97737829e1181fbc2b230a40a9c5b242cfe331ab851fbb971a512f699beedc\"" Oct 2 20:38:49.870480 env[1350]: time="2023-10-02T20:38:49.870453179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:49.879282 env[1350]: time="2023-10-02T20:38:49.879248824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7577b7f-9rtpx,Uid:d04d6efc-69f7-4909-a546-23e6e8bb621e,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:50.016612 env[1350]: time="2023-10-02T20:38:50.016301227Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:50.019299 env[1350]: time="2023-10-02T20:38:50.019257909Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:50.020167 kubelet[2520]: E1002 20:38:50.020139 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:50.020441 kubelet[2520]: E1002 20:38:50.020181 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:50.020441 kubelet[2520]: E1002 20:38:50.020278 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qpb9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-n2xtl_calico-apiserver(289f1a6e-3689-40ce-9443-3f8798dfd3ff): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:50.020441 kubelet[2520]: E1002 20:38:50.020314 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:38:50.032615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicda641c6edd: link becomes ready Oct 2 20:38:50.041429 systemd-networkd[1504]: calicda641c6edd: Link UP Oct 2 20:38:50.041436 systemd-networkd[1504]: calicda641c6edd: Gained carrier Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.951 [INFO][4648] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0 calico-apiserver-7dc7577b7f- calico-apiserver d04d6efc-69f7-4909-a546-23e6e8bb621e 791 0 2023-10-02 20:38:48 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dc7577b7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-855b1f86a1 calico-apiserver-7dc7577b7f-9rtpx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicda641c6edd [] []}} ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.951 [INFO][4648] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.983 [INFO][4661] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" HandleID="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.997 [INFO][4661] ipam_plugin.go 269: Auto assigning IP ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" HandleID="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d610), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-855b1f86a1", "pod":"calico-apiserver-7dc7577b7f-9rtpx", "timestamp":"2023-10-02 20:38:49.983405647 +0000 UTC"}, Hostname:"ci-3510.3.0-a-855b1f86a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:50.054715 env[1350]: time="2023-10-02T20:38:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:50.054715 env[1350]: time="2023-10-02T20:38:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.997 [INFO][4661] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-855b1f86a1' Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:49.998 [INFO][4661] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.002 [INFO][4661] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.005 [INFO][4661] ipam.go 489: Trying affinity for 192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.007 [INFO][4661] ipam.go 155: Attempting to load block cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.008 [INFO][4661] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.192/26 host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.009 [INFO][4661] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.192/26 handle="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.010 [INFO][4661] ipam.go 1682: Creating new handle: k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9 Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.014 [INFO][4661] ipam.go 1203: Writing block in order to claim IPs block=192.168.54.192/26 handle="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.018 [INFO][4661] ipam.go 1216: Successfully claimed IPs: [192.168.54.198/26] block=192.168.54.192/26 handle="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.018 [INFO][4661] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.198/26] handle="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" host="ci-3510.3.0-a-855b1f86a1" Oct 2 20:38:50.054715 env[1350]: time="2023-10-02T20:38:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:50.054715 env[1350]: 2023-10-02 20:38:50.018 [INFO][4661] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.54.198/26] IPv6=[] ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" HandleID="k8s-pod-network.ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.022 [INFO][4648] k8s.go 383: Populated endpoint ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0", GenerateName:"calico-apiserver-7dc7577b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d04d6efc-69f7-4909-a546-23e6e8bb621e", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7577b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"", Pod:"calico-apiserver-7dc7577b7f-9rtpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicda641c6edd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.022 [INFO][4648] k8s.go 384: Calico CNI using IPs: [192.168.54.198/32] ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.022 [INFO][4648] dataplane_linux.go 68: Setting the host side veth name to calicda641c6edd ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.031 [INFO][4648] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.042 [INFO][4648] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0", GenerateName:"calico-apiserver-7dc7577b7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d04d6efc-69f7-4909-a546-23e6e8bb621e", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7577b7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9", Pod:"calico-apiserver-7dc7577b7f-9rtpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicda641c6edd", MAC:"46:93:c8:95:a7:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:50.055270 env[1350]: 2023-10-02 20:38:50.051 [INFO][4648] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7577b7f-9rtpx" WorkloadEndpoint="ci--3510.3.0--a--855b1f86a1-k8s-calico--apiserver--7dc7577b7f--9rtpx-eth0" Oct 2 20:38:50.080188 env[1350]: time="2023-10-02T20:38:50.080104465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:50.080329 env[1350]: time="2023-10-02T20:38:50.080190345Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:50.080329 env[1350]: time="2023-10-02T20:38:50.080219585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:50.081415 env[1350]: time="2023-10-02T20:38:50.080487306Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9 pid=4686 runtime=io.containerd.runc.v2 Oct 2 20:38:50.085000 audit[4691]: NETFILTER_CFG table=filter:135 family=2 entries=46 op=nft_register_chain pid=4691 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:50.085000 audit[4691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23292 a0=3 a1=fffffd6959f0 a2=0 a3=ffff919a0fa0 items=0 ppid=3619 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:50.095011 systemd[1]: Started cri-containerd-ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9.scope. Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit: BPF prog-id=181 op=LOAD Oct 2 20:38:50.114000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.114000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4686 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373831613935353261386634323261656365323033336439633135 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4686 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373831613935353261386634323261656365323033336439633135 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.115000 audit: BPF prog-id=182 op=LOAD Oct 2 20:38:50.115000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4686 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373831613935353261386634323261656365323033336439633135 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.116000 audit: BPF prog-id=183 op=LOAD Oct 2 20:38:50.116000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4686 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373831613935353261386634323261656365323033336439633135 Oct 2 20:38:50.118000 audit: BPF prog-id=183 op=UNLOAD Oct 2 20:38:50.118000 audit: BPF prog-id=182 op=UNLOAD Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:50.118000 audit: BPF prog-id=184 op=LOAD Oct 2 20:38:50.118000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4686 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:50.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373831613935353261386634323261656365323033336439633135 Oct 2 20:38:50.147518 env[1350]: time="2023-10-02T20:38:50.147472706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7577b7f-9rtpx,Uid:d04d6efc-69f7-4909-a546-23e6e8bb621e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ff781a9552a8f422aece2033d9c150ee016246f5427b15212fdbd812d8af95e9\"" Oct 2 20:38:50.150638 env[1350]: time="2023-10-02T20:38:50.149644587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:50.297664 env[1350]: time="2023-10-02T20:38:50.297554356Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:50.300714 env[1350]: time="2023-10-02T20:38:50.300664878Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:50.301276 kubelet[2520]: E1002 20:38:50.301020 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:50.301276 kubelet[2520]: E1002 20:38:50.301059 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:50.301276 kubelet[2520]: E1002 20:38:50.301194 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wfr8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-9rtpx_calico-apiserver(d04d6efc-69f7-4909-a546-23e6e8bb621e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:50.301276 kubelet[2520]: E1002 20:38:50.301244 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:38:50.997188 kubelet[2520]: E1002 20:38:50.997164 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:38:50.997641 kubelet[2520]: E1002 20:38:50.997421 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:38:51.080598 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.w8kT2V.mount: Deactivated successfully. Oct 2 20:38:51.145000 audit[4767]: NETFILTER_CFG table=filter:136 family=2 entries=8 op=nft_register_rule pid=4767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.145000 audit[4767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe850a1f0 a2=0 a3=ffff9222c6c0 items=0 ppid=2675 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.148000 audit[4767]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=4767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.148000 audit[4767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe850a1f0 a2=0 a3=ffff9222c6c0 items=0 ppid=2675 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.223000 audit[4797]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.223000 audit[4797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff436d190 a2=0 a3=ffffb9d2d6c0 items=0 ppid=2675 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.260000 audit[4797]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.260000 audit[4797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff436d190 a2=0 a3=ffffb9d2d6c0 items=0 ppid=2675 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.309035 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.nmBGMG.mount: Deactivated successfully. Oct 2 20:38:51.363773 systemd-networkd[1504]: calicda641c6edd: Gained IPv6LL Oct 2 20:38:51.427854 systemd-networkd[1504]: calif0a2f04d735: Gained IPv6LL Oct 2 20:38:51.998086 kubelet[2520]: E1002 20:38:51.998055 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:38:55.405000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.411134 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 2 20:38:55.411227 kernel: audit: type=1400 audit(1696279135.405:1369): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.406000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.453971 kernel: audit: type=1400 audit(1696279135.406:1370): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.454079 kernel: audit: type=1300 audit(1696279135.406:1370): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a6f6180 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.406000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a6f6180 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.506659 kernel: audit: type=1327 audit(1696279135.406:1370): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.506788 kernel: audit: type=1400 audit(1696279135.406:1371): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.406000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.406000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a6f6240 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.554401 kernel: audit: type=1300 audit(1696279135.406:1371): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a6f6240 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.577821 kernel: audit: type=1327 audit(1696279135.406:1371): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.577922 kernel: audit: type=1400 audit(1696279135.406:1372): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.406000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.406000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40019d1c00 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.625545 kernel: audit: type=1300 audit(1696279135.406:1372): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40019d1c00 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.648575 kernel: audit: type=1327 audit(1696279135.406:1372): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.405000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f19e30 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:55.405000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:55.408000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.408000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40012c5080 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:38:55.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:55.420000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.420000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a6f63f0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.420000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.423000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.423000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a2fd890 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:55.423000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:55.423000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40019d1d60 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:38:55.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:57.756965 env[1350]: time="2023-10-02T20:38:57.756647784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:38:57.913807 env[1350]: time="2023-10-02T20:38:57.913748192Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:57.916728 env[1350]: time="2023-10-02T20:38:57.916685753Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:57.916965 kubelet[2520]: E1002 20:38:57.916940 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:57.917200 kubelet[2520]: E1002 20:38:57.916994 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:57.917200 kubelet[2520]: E1002 20:38:57.917095 2520 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:57.918326 env[1350]: time="2023-10-02T20:38:57.918115474Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:38:58.106534 env[1350]: time="2023-10-02T20:38:58.106402539Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:58.109805 env[1350]: time="2023-10-02T20:38:58.109757700Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:58.110010 kubelet[2520]: E1002 20:38:58.109984 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:58.110081 kubelet[2520]: E1002 20:38:58.110022 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:58.110138 kubelet[2520]: E1002 20:38:58.110121 2520 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:58.110225 kubelet[2520]: E1002 20:38:58.110172 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:38:58.601999 env[1350]: time="2023-10-02T20:38:58.601943572Z" level=info msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.645 [WARNING][4841] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"741b46f9-6473-4feb-b347-0df9b87013ae", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91", Pod:"calico-kube-controllers-69c848ddc6-sw4vd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7dff87c2b77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.646 [INFO][4841] k8s.go 576: Cleaning up netns ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.646 [INFO][4841] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" iface="eth0" netns="" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.646 [INFO][4841] k8s.go 583: Releasing IP address(es) ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.646 [INFO][4841] utils.go 196: Calico CNI releasing IP address ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.670 [INFO][4848] ipam_plugin.go 416: Releasing address using handleID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.682854 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:58.682854 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.679 [WARNING][4848] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.679 [INFO][4848] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.682854 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:58.682854 env[1350]: 2023-10-02 20:38:58.681 [INFO][4841] k8s.go 589: Teardown processing complete. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.683379 env[1350]: time="2023-10-02T20:38:58.683336217Z" level=info msg="TearDown network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" successfully" Oct 2 20:38:58.683449 env[1350]: time="2023-10-02T20:38:58.683434057Z" level=info msg="StopPodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" returns successfully" Oct 2 20:38:58.684013 env[1350]: time="2023-10-02T20:38:58.683991297Z" level=info msg="RemovePodSandbox for \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" Oct 2 20:38:58.684147 env[1350]: time="2023-10-02T20:38:58.684111577Z" level=info msg="Forcibly stopping sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\"" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.732 [WARNING][4867] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"741b46f9-6473-4feb-b347-0df9b87013ae", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"bd94423e0b7a76e7ab83107afe7bf204ff21760419e0485e278025d258909d91", Pod:"calico-kube-controllers-69c848ddc6-sw4vd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7dff87c2b77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.734 [INFO][4867] k8s.go 576: Cleaning up netns ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.734 [INFO][4867] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" iface="eth0" netns="" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.734 [INFO][4867] k8s.go 583: Releasing IP address(es) ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.734 [INFO][4867] utils.go 196: Calico CNI releasing IP address ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.761 [INFO][4873] ipam_plugin.go 416: Releasing address using handleID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.773834 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:58.773834 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.770 [WARNING][4873] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.770 [INFO][4873] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" HandleID="k8s-pod-network.5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Workload="ci--3510.3.0--a--855b1f86a1-k8s-calico--kube--controllers--69c848ddc6--sw4vd-eth0" Oct 2 20:38:58.773834 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:58.773834 env[1350]: 2023-10-02 20:38:58.772 [INFO][4867] k8s.go 589: Teardown processing complete. ContainerID="5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2" Oct 2 20:38:58.774743 env[1350]: time="2023-10-02T20:38:58.774658787Z" level=info msg="TearDown network for sandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" successfully" Oct 2 20:38:58.785777 env[1350]: time="2023-10-02T20:38:58.785739873Z" level=info msg="RemovePodSandbox \"5282776515fc9818a5b94f4044eee885c956b0e9bebb336422fc7822350d16d2\" returns successfully" Oct 2 20:38:58.786364 env[1350]: time="2023-10-02T20:38:58.786343034Z" level=info msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.841 [WARNING][4894] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"109dfe35-73ee-4c74-8dcf-117ec6392f04", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114", Pod:"coredns-787d4945fb-dpnlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif88b19a989f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.842 [INFO][4894] k8s.go 576: Cleaning up netns ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.842 [INFO][4894] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" iface="eth0" netns="" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.842 [INFO][4894] k8s.go 583: Releasing IP address(es) ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.842 [INFO][4894] utils.go 196: Calico CNI releasing IP address ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.866 [INFO][4901] ipam_plugin.go 416: Releasing address using handleID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.879547 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:58.879547 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.876 [WARNING][4901] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.876 [INFO][4901] ipam_plugin.go 444: Releasing address using workloadID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.879547 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:58.879547 env[1350]: 2023-10-02 20:38:58.878 [INFO][4894] k8s.go 589: Teardown processing complete. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.880482 env[1350]: time="2023-10-02T20:38:58.879527565Z" level=info msg="TearDown network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" successfully" Oct 2 20:38:58.880482 env[1350]: time="2023-10-02T20:38:58.880388166Z" level=info msg="StopPodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" returns successfully" Oct 2 20:38:58.880887 env[1350]: time="2023-10-02T20:38:58.880861366Z" level=info msg="RemovePodSandbox for \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" Oct 2 20:38:58.880950 env[1350]: time="2023-10-02T20:38:58.880893646Z" level=info msg="Forcibly stopping sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\"" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.924 [WARNING][4922] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"109dfe35-73ee-4c74-8dcf-117ec6392f04", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"db0423e121d9b548185f73db5110f78e0e5cb10006c9f4ff0773cb32cdcca114", Pod:"coredns-787d4945fb-dpnlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif88b19a989f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.925 [INFO][4922] k8s.go 576: Cleaning up netns ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.925 [INFO][4922] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" iface="eth0" netns="" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.925 [INFO][4922] k8s.go 583: Releasing IP address(es) ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.925 [INFO][4922] utils.go 196: Calico CNI releasing IP address ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.950 [INFO][4928] ipam_plugin.go 416: Releasing address using handleID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.964170 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:58.964170 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.960 [WARNING][4928] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.960 [INFO][4928] ipam_plugin.go 444: Releasing address using workloadID ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" HandleID="k8s-pod-network.72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--dpnlr-eth0" Oct 2 20:38:58.964170 env[1350]: time="2023-10-02T20:38:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:58.964170 env[1350]: 2023-10-02 20:38:58.963 [INFO][4922] k8s.go 589: Teardown processing complete. ContainerID="72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a" Oct 2 20:38:58.964737 env[1350]: time="2023-10-02T20:38:58.964207332Z" level=info msg="TearDown network for sandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" successfully" Oct 2 20:38:58.970885 env[1350]: time="2023-10-02T20:38:58.970830776Z" level=info msg="RemovePodSandbox \"72a873fc0c635565abcb8917f05d4a6c8ff4ef563fe5b1ea44c9ee284731456a\" returns successfully" Oct 2 20:38:58.971410 env[1350]: time="2023-10-02T20:38:58.971366136Z" level=info msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.017 [WARNING][4946] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f80acaac-1174-4751-8af1-1b7ba97c4d9f", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3", Pod:"csi-node-driver-kk5x4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali838b521b884", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.018 [INFO][4946] k8s.go 576: Cleaning up netns ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.018 [INFO][4946] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" iface="eth0" netns="" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.018 [INFO][4946] k8s.go 583: Releasing IP address(es) ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.018 [INFO][4946] utils.go 196: Calico CNI releasing IP address ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.043 [INFO][4953] ipam_plugin.go 416: Releasing address using handleID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.055965 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:59.055965 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.052 [WARNING][4953] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.052 [INFO][4953] ipam_plugin.go 444: Releasing address using workloadID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.055965 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:59.055965 env[1350]: 2023-10-02 20:38:59.054 [INFO][4946] k8s.go 589: Teardown processing complete. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.056393 env[1350]: time="2023-10-02T20:38:59.055983742Z" level=info msg="TearDown network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" successfully" Oct 2 20:38:59.056393 env[1350]: time="2023-10-02T20:38:59.056013382Z" level=info msg="StopPodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" returns successfully" Oct 2 20:38:59.056928 env[1350]: time="2023-10-02T20:38:59.056899663Z" level=info msg="RemovePodSandbox for \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" Oct 2 20:38:59.057002 env[1350]: time="2023-10-02T20:38:59.056932343Z" level=info msg="Forcibly stopping sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\"" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.105 [WARNING][4973] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f80acaac-1174-4751-8af1-1b7ba97c4d9f", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"5700641aea1f5bfdbcfebd3c2dc6e725859736bb6aa11b64f357525499b19fe3", Pod:"csi-node-driver-kk5x4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.54.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali838b521b884", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.106 [INFO][4973] k8s.go 576: Cleaning up netns ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.106 [INFO][4973] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" iface="eth0" netns="" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.106 [INFO][4973] k8s.go 583: Releasing IP address(es) ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.106 [INFO][4973] utils.go 196: Calico CNI releasing IP address ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.132 [INFO][4980] ipam_plugin.go 416: Releasing address using handleID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.145590 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:59.145590 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.141 [WARNING][4980] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.141 [INFO][4980] ipam_plugin.go 444: Releasing address using workloadID ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" HandleID="k8s-pod-network.430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Workload="ci--3510.3.0--a--855b1f86a1-k8s-csi--node--driver--kk5x4-eth0" Oct 2 20:38:59.145590 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:59.145590 env[1350]: 2023-10-02 20:38:59.144 [INFO][4973] k8s.go 589: Teardown processing complete. ContainerID="430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423" Oct 2 20:38:59.146716 env[1350]: time="2023-10-02T20:38:59.145544391Z" level=info msg="TearDown network for sandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" successfully" Oct 2 20:38:59.153966 env[1350]: time="2023-10-02T20:38:59.153926716Z" level=info msg="RemovePodSandbox \"430c55b6b05020d1bd7fba2f148e5fa90747e50c4f824d35f2a7f78272eaf423\" returns successfully" Oct 2 20:38:59.154433 env[1350]: time="2023-10-02T20:38:59.154404436Z" level=info msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.197 [WARNING][4998] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"42618cda-fafb-4a24-a677-1f95c0382d4b", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6", Pod:"coredns-787d4945fb-m9qtj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9c25de40b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.197 [INFO][4998] k8s.go 576: Cleaning up netns ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.198 [INFO][4998] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" iface="eth0" netns="" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.198 [INFO][4998] k8s.go 583: Releasing IP address(es) ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.198 [INFO][4998] utils.go 196: Calico CNI releasing IP address ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.224 [INFO][5004] ipam_plugin.go 416: Releasing address using handleID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.237540 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:59.237540 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.234 [WARNING][5004] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.234 [INFO][5004] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.237540 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:59.237540 env[1350]: 2023-10-02 20:38:59.236 [INFO][4998] k8s.go 589: Teardown processing complete. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.237992 env[1350]: time="2023-10-02T20:38:59.237566562Z" level=info msg="TearDown network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" successfully" Oct 2 20:38:59.237992 env[1350]: time="2023-10-02T20:38:59.237647682Z" level=info msg="StopPodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" returns successfully" Oct 2 20:38:59.238413 env[1350]: time="2023-10-02T20:38:59.238375562Z" level=info msg="RemovePodSandbox for \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" Oct 2 20:38:59.238484 env[1350]: time="2023-10-02T20:38:59.238408002Z" level=info msg="Forcibly stopping sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\"" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.285 [WARNING][5022] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"42618cda-fafb-4a24-a677-1f95c0382d4b", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-855b1f86a1", ContainerID:"0754e87020a13a1457c7136543e621f1f4c07d9fbee99e15ea7bdad75bad6ee6", Pod:"coredns-787d4945fb-m9qtj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9c25de40b0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.285 [INFO][5022] k8s.go 576: Cleaning up netns ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.285 [INFO][5022] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" iface="eth0" netns="" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.285 [INFO][5022] k8s.go 583: Releasing IP address(es) ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.285 [INFO][5022] utils.go 196: Calico CNI releasing IP address ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.314 [INFO][5028] ipam_plugin.go 416: Releasing address using handleID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.326910 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:59.326910 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.323 [WARNING][5028] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.323 [INFO][5028] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" HandleID="k8s-pod-network.e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Workload="ci--3510.3.0--a--855b1f86a1-k8s-coredns--787d4945fb--m9qtj-eth0" Oct 2 20:38:59.326910 env[1350]: time="2023-10-02T20:38:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:59.326910 env[1350]: 2023-10-02 20:38:59.325 [INFO][5022] k8s.go 589: Teardown processing complete. ContainerID="e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028" Oct 2 20:38:59.327361 env[1350]: time="2023-10-02T20:38:59.326940890Z" level=info msg="TearDown network for sandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" successfully" Oct 2 20:38:59.339551 env[1350]: time="2023-10-02T20:38:59.339500377Z" level=info msg="RemovePodSandbox \"e866d4ac182862e8f72cba7483a7e11f92e20dc8147f023baf995f7869a46028\" returns successfully" Oct 2 20:39:01.081234 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.I6w2AN.mount: Deactivated successfully. Oct 2 20:39:02.076619 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.OhdGyn.mount: Deactivated successfully. Oct 2 20:39:03.757177 env[1350]: time="2023-10-02T20:39:03.757134708Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:03.930141 env[1350]: time="2023-10-02T20:39:03.930067239Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:03.934379 env[1350]: time="2023-10-02T20:39:03.934317081Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:03.934654 kubelet[2520]: E1002 20:39:03.934627 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:03.934895 kubelet[2520]: E1002 20:39:03.934688 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:03.935180 kubelet[2520]: E1002 20:39:03.934808 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qpb9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-n2xtl_calico-apiserver(289f1a6e-3689-40ce-9443-3f8798dfd3ff): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:03.935280 kubelet[2520]: E1002 20:39:03.935190 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:39:04.756518 env[1350]: time="2023-10-02T20:39:04.756475231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:04.914634 env[1350]: time="2023-10-02T20:39:04.914565914Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:04.918210 env[1350]: time="2023-10-02T20:39:04.918162636Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:04.918462 kubelet[2520]: E1002 20:39:04.918438 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:04.918530 kubelet[2520]: E1002 20:39:04.918477 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:04.918612 kubelet[2520]: E1002 20:39:04.918595 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wfr8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-9rtpx_calico-apiserver(d04d6efc-69f7-4909-a546-23e6e8bb621e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:04.918721 kubelet[2520]: E1002 20:39:04.918636 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:39:09.757430 kubelet[2520]: E1002 20:39:09.757399 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:39:10.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.767481 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:39:10.767614 kernel: audit: type=1400 audit(1696279150.761:1377): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.761000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fa2d80 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.816806 kernel: audit: type=1300 audit(1696279150.761:1377): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fa2d80 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.839996 kernel: audit: type=1327 audit(1696279150.761:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.840115 kernel: audit: type=1400 audit(1696279150.763:1378): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.763000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dd79c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.889630 kernel: audit: type=1300 audit(1696279150.763:1378): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dd79c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.913304 kernel: audit: type=1327 audit(1696279150.763:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.913418 kernel: audit: type=1400 audit(1696279150.765:1379): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.765000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dd7a00 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.962809 kernel: audit: type=1300 audit(1696279150.765:1379): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000dd7a00 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.765000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.987044 kernel: audit: type=1327 audit(1696279150.765:1379): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:10.987167 kernel: audit: type=1400 audit(1696279150.766:1380): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:10.766000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fa3220 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:10.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:11.079143 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.4084ZK.mount: Deactivated successfully. Oct 2 20:39:12.074378 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.Y4YXhi.mount: Deactivated successfully. Oct 2 20:39:17.756923 kubelet[2520]: E1002 20:39:17.756852 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:39:17.757287 kubelet[2520]: E1002 20:39:17.757084 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:39:20.757193 env[1350]: time="2023-10-02T20:39:20.757140111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:39:20.924279 env[1350]: time="2023-10-02T20:39:20.924097629Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:20.927752 env[1350]: time="2023-10-02T20:39:20.927682110Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:20.928016 kubelet[2520]: E1002 20:39:20.927997 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:20.928317 kubelet[2520]: E1002 20:39:20.928306 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:20.928481 kubelet[2520]: E1002 20:39:20.928468 2520 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:20.929505 env[1350]: time="2023-10-02T20:39:20.929336791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:39:21.080677 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.TLyzZ7.mount: Deactivated successfully. Oct 2 20:39:21.089280 env[1350]: time="2023-10-02T20:39:21.089224626Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:21.092861 env[1350]: time="2023-10-02T20:39:21.092790308Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:21.093375 kubelet[2520]: E1002 20:39:21.093126 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:21.093375 kubelet[2520]: E1002 20:39:21.093182 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:21.093375 kubelet[2520]: E1002 20:39:21.093291 2520 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:21.093375 kubelet[2520]: E1002 20:39:21.093350 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:39:22.076761 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.JYC8vA.mount: Deactivated successfully. Oct 2 20:39:31.081032 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.Zkha0m.mount: Deactivated successfully. Oct 2 20:39:31.757778 env[1350]: time="2023-10-02T20:39:31.757743193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:31.758443 kubelet[2520]: E1002 20:39:31.758406 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:39:31.904491 env[1350]: time="2023-10-02T20:39:31.904428299Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:31.910613 env[1350]: time="2023-10-02T20:39:31.910560261Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:31.911329 kubelet[2520]: E1002 20:39:31.910796 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:31.911329 kubelet[2520]: E1002 20:39:31.910833 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:31.911329 kubelet[2520]: E1002 20:39:31.910951 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wfr8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-9rtpx_calico-apiserver(d04d6efc-69f7-4909-a546-23e6e8bb621e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:31.911329 kubelet[2520]: E1002 20:39:31.911305 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:39:32.075927 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.8xy4Ft.mount: Deactivated successfully. Oct 2 20:39:32.757002 env[1350]: time="2023-10-02T20:39:32.756968356Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:32.927718 env[1350]: time="2023-10-02T20:39:32.927655631Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:32.931696 env[1350]: time="2023-10-02T20:39:32.931651033Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:32.932007 kubelet[2520]: E1002 20:39:32.931985 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:32.932218 kubelet[2520]: E1002 20:39:32.932026 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:32.932218 kubelet[2520]: E1002 20:39:32.932112 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qpb9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-n2xtl_calico-apiserver(289f1a6e-3689-40ce-9443-3f8798dfd3ff): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:32.932218 kubelet[2520]: E1002 20:39:32.932164 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:39:41.080457 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.VxgqtM.mount: Deactivated successfully. Oct 2 20:39:42.075798 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.7VXSDR.mount: Deactivated successfully. Oct 2 20:39:42.757760 kubelet[2520]: E1002 20:39:42.757722 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:39:45.756315 kubelet[2520]: E1002 20:39:45.756282 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:39:46.756469 kubelet[2520]: E1002 20:39:46.756436 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:39:51.080588 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.oqqUpR.mount: Deactivated successfully. Oct 2 20:39:51.304806 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.FcnFEm.mount: Deactivated successfully. Oct 2 20:39:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.412717 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:39:55.433401 kernel: audit: type=1400 audit(1696279195.407:1381): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400f1b7440 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.460032 kernel: audit: type=1300 audit(1696279195.407:1381): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400f1b7440 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.484746 kernel: audit: type=1327 audit(1696279195.407:1381): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.506362 kernel: audit: type=1400 audit(1696279195.407:1382): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.506491 kernel: audit: type=1300 audit(1696279195.407:1382): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40086c2960 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40086c2960 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.555631 kernel: audit: type=1327 audit(1696279195.407:1382): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.555751 kernel: audit: type=1400 audit(1696279195.407:1383): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40086c2990 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.603218 kernel: audit: type=1300 audit(1696279195.407:1383): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40086c2990 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.626908 kernel: audit: type=1327 audit(1696279195.407:1383): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.412000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.648187 kernel: audit: type=1400 audit(1696279195.412:1384): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.412000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400234fb60 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:55.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:55.412000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.412000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021eccc0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:39:55.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:55.421000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.421000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400848fe90 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.432000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.432000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400f1b7560 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:55.433000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:55.433000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400848ff80 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:39:55.433000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:57.757457 kubelet[2520]: E1002 20:39:57.757428 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:39:57.757922 kubelet[2520]: E1002 20:39:57.757809 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:40:01.081422 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.zkCbKj.mount: Deactivated successfully. Oct 2 20:40:01.756808 kubelet[2520]: E1002 20:40:01.756781 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:40:02.075807 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.wce2Ji.mount: Deactivated successfully. Oct 2 20:40:06.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.39:22-10.200.12.6:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:06.735190 systemd[1]: Started sshd@7-10.200.20.39:22-10.200.12.6:52906.service. Oct 2 20:40:06.740209 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:40:06.740297 kernel: audit: type=1130 audit(1696279206.734:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.39:22-10.200.12.6:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:07.158000 audit[5502]: USER_ACCT pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.159475 sshd[5502]: Accepted publickey for core from 10.200.12.6 port 52906 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:07.182630 kernel: audit: type=1101 audit(1696279207.158:1390): pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.183000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.184318 sshd[5502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:07.189531 systemd[1]: Started session-10.scope. Oct 2 20:40:07.190629 systemd-logind[1339]: New session 10 of user core. Oct 2 20:40:07.219605 kernel: audit: type=1103 audit(1696279207.183:1391): pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.219743 kernel: audit: type=1006 audit(1696279207.183:1392): pid=5502 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 20:40:07.219776 kernel: audit: type=1300 audit(1696279207.183:1392): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef5b3d60 a2=3 a3=1 items=0 ppid=1 pid=5502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:07.183000 audit[5502]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef5b3d60 a2=3 a3=1 items=0 ppid=1 pid=5502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:07.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:07.250491 kernel: audit: type=1327 audit(1696279207.183:1392): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:07.250770 kernel: audit: type=1105 audit(1696279207.206:1393): pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.206000 audit[5502]: USER_START pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.209000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.298068 kernel: audit: type=1103 audit(1696279207.209:1394): pid=5504 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.589441 sshd[5502]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:07.589000 audit[5502]: USER_END pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.593071 systemd-logind[1339]: Session 10 logged out. Waiting for processes to exit. Oct 2 20:40:07.599827 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 20:40:07.600987 systemd-logind[1339]: Removed session 10. Oct 2 20:40:07.601641 systemd[1]: sshd@7-10.200.20.39:22-10.200.12.6:52906.service: Deactivated successfully. Oct 2 20:40:07.589000 audit[5502]: CRED_DISP pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.636118 kernel: audit: type=1106 audit(1696279207.589:1395): pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.636262 kernel: audit: type=1104 audit(1696279207.589:1396): pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.39:22-10.200.12.6:52906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:08.757193 kubelet[2520]: E1002 20:40:08.757169 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:40:09.757204 env[1350]: time="2023-10-02T20:40:09.757154224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:09.929277 env[1350]: time="2023-10-02T20:40:09.929216602Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:09.934142 env[1350]: time="2023-10-02T20:40:09.934100437Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:09.934458 kubelet[2520]: E1002 20:40:09.934431 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:09.934753 kubelet[2520]: E1002 20:40:09.934470 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:09.934753 kubelet[2520]: E1002 20:40:09.934556 2520 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:09.935464 env[1350]: time="2023-10-02T20:40:09.935440323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:10.087049 env[1350]: time="2023-10-02T20:40:10.086929545Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:10.092138 env[1350]: time="2023-10-02T20:40:10.092089473Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:10.092606 kubelet[2520]: E1002 20:40:10.092567 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:10.092701 kubelet[2520]: E1002 20:40:10.092623 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:10.092734 kubelet[2520]: E1002 20:40:10.092724 2520 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:10.092808 kubelet[2520]: E1002 20:40:10.092784 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:40:10.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:10.764000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002764bc0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:10.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:10.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:10.764000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002764be0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:10.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:10.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:10.766000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002819480 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:10.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:10.768000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:10.768000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002764e00 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:10.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:11.081611 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.MeKil2.mount: Deactivated successfully. Oct 2 20:40:12.076433 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.BECHaK.mount: Deactivated successfully. Oct 2 20:40:16.757390 env[1350]: time="2023-10-02T20:40:16.757323426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:16.943150 env[1350]: time="2023-10-02T20:40:16.943080626Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:16.947703 env[1350]: time="2023-10-02T20:40:16.947668017Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:16.947990 kubelet[2520]: E1002 20:40:16.947966 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:16.948273 kubelet[2520]: E1002 20:40:16.948007 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:16.948273 kubelet[2520]: E1002 20:40:16.948126 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wfr8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-9rtpx_calico-apiserver(d04d6efc-69f7-4909-a546-23e6e8bb621e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:16.948512 kubelet[2520]: E1002 20:40:16.948490 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:40:17.660044 systemd[1]: Started sshd@8-10.200.20.39:22-10.200.12.6:34502.service. Oct 2 20:40:17.677822 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 20:40:17.677943 kernel: audit: type=1130 audit(1696279217.658:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.39:22-10.200.12.6:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:17.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.39:22-10.200.12.6:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:18.077000 audit[5590]: USER_ACCT pid=5590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.079661 sshd[5590]: Accepted publickey for core from 10.200.12.6 port 34502 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:18.081776 sshd[5590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:18.077000 audit[5590]: CRED_ACQ pid=5590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.105292 systemd-logind[1339]: New session 11 of user core. Oct 2 20:40:18.105863 systemd[1]: Started session-11.scope. Oct 2 20:40:18.122511 kernel: audit: type=1101 audit(1696279218.077:1403): pid=5590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.122634 kernel: audit: type=1103 audit(1696279218.077:1404): pid=5590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.136526 kernel: audit: type=1006 audit(1696279218.077:1405): pid=5590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 20:40:18.136771 kernel: audit: type=1300 audit(1696279218.077:1405): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3cfc510 a2=3 a3=1 items=0 ppid=1 pid=5590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.077000 audit[5590]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3cfc510 a2=3 a3=1 items=0 ppid=1 pid=5590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:18.166585 kernel: audit: type=1327 audit(1696279218.077:1405): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:18.122000 audit[5590]: USER_START pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.190705 kernel: audit: type=1105 audit(1696279218.122:1406): pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.190830 kernel: audit: type=1103 audit(1696279218.122:1407): pid=5592 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.122000 audit[5592]: CRED_ACQ pid=5592 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.475665 sshd[5590]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:18.476000 audit[5590]: USER_END pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.478887 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 20:40:18.479554 systemd[1]: sshd@8-10.200.20.39:22-10.200.12.6:34502.service: Deactivated successfully. Oct 2 20:40:18.476000 audit[5590]: CRED_DISP pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.502708 systemd-logind[1339]: Session 11 logged out. Waiting for processes to exit. Oct 2 20:40:18.503725 systemd-logind[1339]: Removed session 11. Oct 2 20:40:18.522720 kernel: audit: type=1106 audit(1696279218.476:1408): pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.522860 kernel: audit: type=1104 audit(1696279218.476:1409): pid=5590 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.39:22-10.200.12.6:34502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:20.756970 env[1350]: time="2023-10-02T20:40:20.756914775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:20.913433 env[1350]: time="2023-10-02T20:40:20.913327073Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:20.917449 env[1350]: time="2023-10-02T20:40:20.917405062Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:20.917669 kubelet[2520]: E1002 20:40:20.917644 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:20.917950 kubelet[2520]: E1002 20:40:20.917693 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:20.917950 kubelet[2520]: E1002 20:40:20.917806 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qpb9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-n2xtl_calico-apiserver(289f1a6e-3689-40ce-9443-3f8798dfd3ff): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:20.917950 kubelet[2520]: E1002 20:40:20.917854 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:40:21.079567 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.ZWzCOq.mount: Deactivated successfully. Oct 2 20:40:21.304358 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.f6Ehgv.mount: Deactivated successfully. Oct 2 20:40:24.759149 kubelet[2520]: E1002 20:40:24.759116 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:40:28.572559 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:28.572703 kernel: audit: type=1130 audit(1696279228.546:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.39:22-10.200.12.6:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.39:22-10.200.12.6:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.546932 systemd[1]: Started sshd@9-10.200.20.39:22-10.200.12.6:50614.service. Oct 2 20:40:28.756684 kubelet[2520]: E1002 20:40:28.756654 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:40:28.966000 audit[5664]: USER_ACCT pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.968615 sshd[5664]: Accepted publickey for core from 10.200.12.6 port 50614 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:28.970700 sshd[5664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:28.976630 systemd[1]: Started session-12.scope. Oct 2 20:40:28.977917 systemd-logind[1339]: New session 12 of user core. Oct 2 20:40:28.968000 audit[5664]: CRED_ACQ pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.012505 kernel: audit: type=1101 audit(1696279228.966:1412): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.012648 kernel: audit: type=1103 audit(1696279228.968:1413): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.025990 kernel: audit: type=1006 audit(1696279228.968:1414): pid=5664 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 20:40:28.968000 audit[5664]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefeaf890 a2=3 a3=1 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.049019 kernel: audit: type=1300 audit(1696279228.968:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefeaf890 a2=3 a3=1 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:28.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:29.057640 kernel: audit: type=1327 audit(1696279228.968:1414): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:28.991000 audit[5664]: USER_START pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.062593 kernel: audit: type=1105 audit(1696279228.991:1415): pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.994000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.109498 kernel: audit: type=1103 audit(1696279228.994:1416): pid=5666 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.373000 audit[5664]: USER_END pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.373850 sshd[5664]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:29.373000 audit[5664]: CRED_DISP pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.399996 systemd[1]: sshd@9-10.200.20.39:22-10.200.12.6:50614.service: Deactivated successfully. Oct 2 20:40:29.400840 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 20:40:29.420559 kernel: audit: type=1106 audit(1696279229.373:1417): pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.420759 kernel: audit: type=1104 audit(1696279229.373:1418): pid=5664 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.39:22-10.200.12.6:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:29.421437 systemd-logind[1339]: Session 12 logged out. Waiting for processes to exit. Oct 2 20:40:29.422278 systemd-logind[1339]: Removed session 12. Oct 2 20:40:29.443538 systemd[1]: Started sshd@10-10.200.20.39:22-10.200.12.6:50628.service. Oct 2 20:40:29.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.39:22-10.200.12.6:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:29.860000 audit[5677]: USER_ACCT pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.862391 sshd[5677]: Accepted publickey for core from 10.200.12.6 port 50628 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:29.864174 sshd[5677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:29.862000 audit[5677]: CRED_ACQ pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.862000 audit[5677]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd9d5820 a2=3 a3=1 items=0 ppid=1 pid=5677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:29.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:29.868484 systemd-logind[1339]: New session 13 of user core. Oct 2 20:40:29.869180 systemd[1]: Started session-13.scope. Oct 2 20:40:29.871000 audit[5677]: USER_START pid=5677 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.874000 audit[5679]: CRED_ACQ pid=5679 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.113987 sshd[5677]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:31.113000 audit[5677]: USER_END pid=5677 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.113000 audit[5677]: CRED_DISP pid=5677 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.116575 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 20:40:31.117257 systemd-logind[1339]: Session 13 logged out. Waiting for processes to exit. Oct 2 20:40:31.117362 systemd[1]: sshd@10-10.200.20.39:22-10.200.12.6:50628.service: Deactivated successfully. Oct 2 20:40:31.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.39:22-10.200.12.6:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:31.118496 systemd-logind[1339]: Removed session 13. Oct 2 20:40:31.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.39:22-10.200.12.6:50630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:31.182486 systemd[1]: Started sshd@11-10.200.20.39:22-10.200.12.6:50630.service. Oct 2 20:40:31.303819 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.f34iKZ.mount: Deactivated successfully. Oct 2 20:40:31.335817 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.PuZuzl.mount: Deactivated successfully. Oct 2 20:40:31.605000 audit[5712]: USER_ACCT pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.607236 sshd[5712]: Accepted publickey for core from 10.200.12.6 port 50630 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:31.607000 audit[5712]: CRED_ACQ pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.607000 audit[5712]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe833b9f0 a2=3 a3=1 items=0 ppid=1 pid=5712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:31.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:31.609121 sshd[5712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:31.613493 systemd[1]: Started session-14.scope. Oct 2 20:40:31.614756 systemd-logind[1339]: New session 14 of user core. Oct 2 20:40:31.617000 audit[5712]: USER_START pid=5712 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:31.620000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:32.017794 sshd[5712]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:32.017000 audit[5712]: USER_END pid=5712 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:32.017000 audit[5712]: CRED_DISP pid=5712 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:32.020884 systemd-logind[1339]: Session 14 logged out. Waiting for processes to exit. Oct 2 20:40:32.022118 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 20:40:32.023182 systemd-logind[1339]: Removed session 14. Oct 2 20:40:32.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.39:22-10.200.12.6:50630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:32.023817 systemd[1]: sshd@11-10.200.20.39:22-10.200.12.6:50630.service: Deactivated successfully. Oct 2 20:40:33.757098 kubelet[2520]: E1002 20:40:33.756904 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:40:39.757299 kubelet[2520]: E1002 20:40:39.757275 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:40:40.756906 kubelet[2520]: E1002 20:40:40.756874 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:40:41.079923 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.LR52mt.mount: Deactivated successfully. Oct 2 20:40:41.303489 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.oWnlom.mount: Deactivated successfully. Oct 2 20:40:42.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.39:22-10.200.12.6:45400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:42.090073 systemd[1]: Started sshd@12-10.200.20.39:22-10.200.12.6:45400.service. Oct 2 20:40:42.095616 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 20:40:42.095716 kernel: audit: type=1130 audit(1696279242.089:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.39:22-10.200.12.6:45400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:42.508000 audit[5828]: USER_ACCT pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.509605 sshd[5828]: Accepted publickey for core from 10.200.12.6 port 45400 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:42.533617 kernel: audit: type=1101 audit(1696279242.508:1439): pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.532000 audit[5828]: CRED_ACQ pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.533709 sshd[5828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:42.568326 kernel: audit: type=1103 audit(1696279242.532:1440): pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.568438 kernel: audit: type=1006 audit(1696279242.532:1441): pid=5828 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 20:40:42.568468 kernel: audit: type=1300 audit(1696279242.532:1441): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff69ea220 a2=3 a3=1 items=0 ppid=1 pid=5828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:42.532000 audit[5828]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff69ea220 a2=3 a3=1 items=0 ppid=1 pid=5828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:42.532000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:42.595736 systemd[1]: Started session-15.scope. Oct 2 20:40:42.596064 systemd-logind[1339]: New session 15 of user core. Oct 2 20:40:42.598766 kernel: audit: type=1327 audit(1696279242.532:1441): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:42.601000 audit[5828]: USER_START pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.605000 audit[5830]: CRED_ACQ pid=5830 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.648150 kernel: audit: type=1105 audit(1696279242.601:1442): pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.648284 kernel: audit: type=1103 audit(1696279242.605:1443): pid=5830 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.946778 sshd[5828]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:42.947000 audit[5828]: USER_END pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.949902 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 20:40:42.950642 systemd[1]: sshd@12-10.200.20.39:22-10.200.12.6:45400.service: Deactivated successfully. Oct 2 20:40:42.947000 audit[5828]: CRED_DISP pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.991946 kernel: audit: type=1106 audit(1696279242.947:1444): pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.992066 kernel: audit: type=1104 audit(1696279242.947:1445): pid=5828 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:42.992041 systemd-logind[1339]: Session 15 logged out. Waiting for processes to exit. Oct 2 20:40:42.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.39:22-10.200.12.6:45400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:42.993015 systemd-logind[1339]: Removed session 15. Oct 2 20:40:46.757063 kubelet[2520]: E1002 20:40:46.756998 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:40:51.080937 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.E0ME45.mount: Deactivated successfully. Oct 2 20:40:52.756593 kubelet[2520]: E1002 20:40:52.756547 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:40:54.757478 kubelet[2520]: E1002 20:40:54.757453 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:40:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.413246 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:55.413369 kernel: audit: type=1400 audit(1696279255.407:1447): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.455722 kernel: audit: type=1400 audit(1696279255.407:1448): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.455853 kernel: audit: type=1300 audit(1696279255.407:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007f6a150 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007f6a150 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.504936 kernel: audit: type=1327 audit(1696279255.407:1447): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.505036 kernel: audit: type=1400 audit(1696279255.407:1449): avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.407000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007f6a1b0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.552110 kernel: audit: type=1300 audit(1696279255.407:1449): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007f6a1b0 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.574769 kernel: audit: type=1327 audit(1696279255.407:1449): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.407000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4003e1d840 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.601125 kernel: audit: type=1300 audit(1696279255.407:1448): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4003e1d840 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.623884 kernel: audit: type=1327 audit(1696279255.407:1448): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.624009 kernel: audit: type=1400 audit(1696279255.412:1450): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.412000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.412000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015d0360 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:55.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:55.412000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.412000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400134e060 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:40:55.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:55.421000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.421000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400817b950 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.432000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.432000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4003e2ce20 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:55.432000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:55.432000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400817b980 a2=fc6 a3=0 items=0 ppid=2212 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c987 key=(null) Oct 2 20:40:55.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:59.756390 kubelet[2520]: E1002 20:40:59.756351 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:41:01.079786 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.jARCmi.mount: Deactivated successfully. Oct 2 20:41:02.075272 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.vNZ4Fd.mount: Deactivated successfully. Oct 2 20:41:06.756360 kubelet[2520]: E1002 20:41:06.756331 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:41:07.757374 kubelet[2520]: E1002 20:41:07.757344 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:41:10.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.770439 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:41:10.770563 kernel: audit: type=1400 audit(1696279270.764:1456): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.812810 kernel: audit: type=1400 audit(1696279270.764:1455): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.764000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400134f8a0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.841389 kernel: audit: type=1300 audit(1696279270.764:1455): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400134f8a0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.865008 kernel: audit: type=1327 audit(1696279270.764:1455): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.865136 kernel: audit: type=1300 audit(1696279270.764:1456): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b6c60 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.764000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b6c60 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.915259 kernel: audit: type=1327 audit(1696279270.764:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.915369 kernel: audit: type=1400 audit(1696279270.766:1457): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.766000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b6ca0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.964770 kernel: audit: type=1300 audit(1696279270.766:1457): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b6ca0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.964919 kernel: audit: type=1327 audit(1696279270.766:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:10.768000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:11.009182 kernel: audit: type=1400 audit(1696279270.768:1458): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:10.768000 audit[2405]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b6ee0 a2=fc6 a3=0 items=0 ppid=2277 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:10.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:11.079943 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.C3LusM.mount: Deactivated successfully. Oct 2 20:41:11.304338 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.R1ycLE.mount: Deactivated successfully. Oct 2 20:41:12.756421 kubelet[2520]: E1002 20:41:12.756387 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:41:17.756884 kubelet[2520]: E1002 20:41:17.756855 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:41:18.757515 kubelet[2520]: E1002 20:41:18.757475 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:41:21.080948 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.bkU7Ab.mount: Deactivated successfully. Oct 2 20:41:21.330079 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.JrbBQH.mount: Deactivated successfully. Oct 2 20:41:23.756547 kubelet[2520]: E1002 20:41:23.756521 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:41:28.756389 kubelet[2520]: E1002 20:41:28.756366 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:41:28.865451 systemd[1]: cri-containerd-38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5.scope: Deactivated successfully. Oct 2 20:41:28.865773 systemd[1]: cri-containerd-38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5.scope: Consumed 4.082s CPU time. Oct 2 20:41:28.864000 audit: BPF prog-id=121 op=UNLOAD Oct 2 20:41:28.871667 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:41:28.871768 kernel: audit: type=1334 audit(1696279288.864:1459): prog-id=121 op=UNLOAD Oct 2 20:41:28.877000 audit: BPF prog-id=124 op=UNLOAD Oct 2 20:41:28.885150 kernel: audit: type=1334 audit(1696279288.877:1460): prog-id=124 op=UNLOAD Oct 2 20:41:28.899761 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5-rootfs.mount: Deactivated successfully. Oct 2 20:41:28.912927 env[1350]: time="2023-10-02T20:41:28.912886660Z" level=info msg="shim disconnected" id=38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5 Oct 2 20:41:28.913278 env[1350]: time="2023-10-02T20:41:28.913255310Z" level=warning msg="cleaning up after shim disconnected" id=38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5 namespace=k8s.io Oct 2 20:41:28.913375 env[1350]: time="2023-10-02T20:41:28.913360473Z" level=info msg="cleaning up dead shim" Oct 2 20:41:28.927091 env[1350]: time="2023-10-02T20:41:28.927055563Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:41:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6111 runtime=io.containerd.runc.v2\n" Oct 2 20:41:29.252316 kubelet[2520]: E1002 20:41:29.252280 2520 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.39:32884->10.200.20.13:2379: read: connection timed out Oct 2 20:41:29.257818 systemd[1]: cri-containerd-15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610.scope: Deactivated successfully. Oct 2 20:41:29.258117 systemd[1]: cri-containerd-15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610.scope: Consumed 2.245s CPU time. Oct 2 20:41:29.260000 audit: BPF prog-id=84 op=UNLOAD Oct 2 20:41:29.260000 audit: BPF prog-id=95 op=UNLOAD Oct 2 20:41:29.275379 kernel: audit: type=1334 audit(1696279289.260:1461): prog-id=84 op=UNLOAD Oct 2 20:41:29.275533 kernel: audit: type=1334 audit(1696279289.260:1462): prog-id=95 op=UNLOAD Oct 2 20:41:29.284789 kubelet[2520]: I1002 20:41:29.284759 2520 scope.go:115] "RemoveContainer" containerID="38e3104853d473fbb4dab48f00e3c53b2e75c0dc6065d16a725975ff87d868b5" Oct 2 20:41:29.287466 env[1350]: time="2023-10-02T20:41:29.287429145Z" level=info msg="CreateContainer within sandbox \"4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 20:41:29.294109 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610-rootfs.mount: Deactivated successfully. Oct 2 20:41:29.311994 env[1350]: time="2023-10-02T20:41:29.311954441Z" level=info msg="shim disconnected" id=15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610 Oct 2 20:41:29.312280 env[1350]: time="2023-10-02T20:41:29.312258969Z" level=warning msg="cleaning up after shim disconnected" id=15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610 namespace=k8s.io Oct 2 20:41:29.312366 env[1350]: time="2023-10-02T20:41:29.312352372Z" level=info msg="cleaning up dead shim" Oct 2 20:41:29.324648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3336678054.mount: Deactivated successfully. Oct 2 20:41:29.337974 env[1350]: time="2023-10-02T20:41:29.337940696Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:41:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6137 runtime=io.containerd.runc.v2\n" Oct 2 20:41:29.349064 env[1350]: time="2023-10-02T20:41:29.349024993Z" level=info msg="CreateContainer within sandbox \"4f6b2d9efb4a21e161690339f84f4fa69c83226d36014e5a6fd6aa9235ec66e8\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"d919cd7fb1b8f9a0a9b585e18600229f1ed3888c346be12b4ebbb723ec893a7a\"" Oct 2 20:41:29.349764 env[1350]: time="2023-10-02T20:41:29.349739212Z" level=info msg="StartContainer for \"d919cd7fb1b8f9a0a9b585e18600229f1ed3888c346be12b4ebbb723ec893a7a\"" Oct 2 20:41:29.368019 systemd[1]: Started cri-containerd-d919cd7fb1b8f9a0a9b585e18600229f1ed3888c346be12b4ebbb723ec893a7a.scope. Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.419799 kernel: audit: type=1400 audit(1696279289.385:1463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.419904 kernel: audit: type=1400 audit(1696279289.385:1464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.436662 kernel: audit: type=1400 audit(1696279289.385:1465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.471143 kernel: audit: type=1400 audit(1696279289.385:1466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.471254 kernel: audit: type=1400 audit(1696279289.385:1467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.489624 kernel: audit: type=1400 audit(1696279289.385:1468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.401000 audit: BPF prog-id=185 op=LOAD Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2730 pid=6157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:29.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313963643766623162386639613061396235383565313836303032 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2730 pid=6157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:29.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313963643766623162386639613061396235383565313836303032 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit: BPF prog-id=186 op=LOAD Oct 2 20:41:29.418000 audit[6157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2730 pid=6157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:29.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313963643766623162386639613061396235383565313836303032 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit: BPF prog-id=187 op=LOAD Oct 2 20:41:29.418000 audit[6157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2730 pid=6157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:29.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313963643766623162386639613061396235383565313836303032 Oct 2 20:41:29.418000 audit: BPF prog-id=187 op=UNLOAD Oct 2 20:41:29.418000 audit: BPF prog-id=186 op=UNLOAD Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { perfmon } for pid=6157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit[6157]: AVC avc: denied { bpf } for pid=6157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:29.418000 audit: BPF prog-id=188 op=LOAD Oct 2 20:41:29.418000 audit[6157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2730 pid=6157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:29.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313963643766623162386639613061396235383565313836303032 Oct 2 20:41:29.507803 env[1350]: time="2023-10-02T20:41:29.507708080Z" level=info msg="StartContainer for \"d919cd7fb1b8f9a0a9b585e18600229f1ed3888c346be12b4ebbb723ec893a7a\" returns successfully" Oct 2 20:41:29.895930 systemd[1]: cri-containerd-24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31.scope: Deactivated successfully. Oct 2 20:41:29.896233 systemd[1]: cri-containerd-24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31.scope: Consumed 3.382s CPU time. Oct 2 20:41:29.902088 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount476181569.mount: Deactivated successfully. Oct 2 20:41:29.904000 audit: BPF prog-id=88 op=UNLOAD Oct 2 20:41:29.904000 audit: BPF prog-id=94 op=UNLOAD Oct 2 20:41:29.924483 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31-rootfs.mount: Deactivated successfully. Oct 2 20:41:29.950881 env[1350]: time="2023-10-02T20:41:29.950825818Z" level=info msg="shim disconnected" id=24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31 Oct 2 20:41:29.950881 env[1350]: time="2023-10-02T20:41:29.950869579Z" level=warning msg="cleaning up after shim disconnected" id=24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31 namespace=k8s.io Oct 2 20:41:29.950881 env[1350]: time="2023-10-02T20:41:29.950878940Z" level=info msg="cleaning up dead shim" Oct 2 20:41:29.962478 env[1350]: time="2023-10-02T20:41:29.962431769Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:41:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6195 runtime=io.containerd.runc.v2\n" Oct 2 20:41:30.288628 kubelet[2520]: I1002 20:41:30.288286 2520 scope.go:115] "RemoveContainer" containerID="15adb69bbb83e067244b8bb18f09d382a95b73ba56b3e1adcffe03dd4f2de610" Oct 2 20:41:30.290852 env[1350]: time="2023-10-02T20:41:30.290812410Z" level=info msg="CreateContainer within sandbox \"a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 20:41:30.292357 kubelet[2520]: I1002 20:41:30.291961 2520 scope.go:115] "RemoveContainer" containerID="24c11dcbe3cc9afbe72fb4831c59ba1ea44bd57bfd0e9b1c5dd68b1ed7b7ce31" Oct 2 20:41:30.293822 env[1350]: time="2023-10-02T20:41:30.293790609Z" level=info msg="CreateContainer within sandbox \"5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 20:41:30.315640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1272948246.mount: Deactivated successfully. Oct 2 20:41:30.332619 env[1350]: time="2023-10-02T20:41:30.332553517Z" level=info msg="CreateContainer within sandbox \"5669d21173db50c2c43dcc713d9caa9716c58435c37eb2d9924fe7d41e2aed9e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"256923a8470dabf46725bf888ba3c59851cdf576c295f56ce5f65575da66f597\"" Oct 2 20:41:30.333304 env[1350]: time="2023-10-02T20:41:30.333277057Z" level=info msg="StartContainer for \"256923a8470dabf46725bf888ba3c59851cdf576c295f56ce5f65575da66f597\"" Oct 2 20:41:30.341063 env[1350]: time="2023-10-02T20:41:30.341024942Z" level=info msg="CreateContainer within sandbox \"a6465a1b7ae343c9e70e0db662e57592098f93d57709b46e933caee5b5b28f8c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"064411d0d7e1887f594f4df3f7de322780fb5e79a3454292003d05ca9f2dbfe5\"" Oct 2 20:41:30.341790 env[1350]: time="2023-10-02T20:41:30.341739801Z" level=info msg="StartContainer for \"064411d0d7e1887f594f4df3f7de322780fb5e79a3454292003d05ca9f2dbfe5\"" Oct 2 20:41:30.358765 systemd[1]: Started cri-containerd-256923a8470dabf46725bf888ba3c59851cdf576c295f56ce5f65575da66f597.scope. Oct 2 20:41:30.373015 systemd[1]: Started cri-containerd-064411d0d7e1887f594f4df3f7de322780fb5e79a3454292003d05ca9f2dbfe5.scope. Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit: BPF prog-id=189 op=LOAD Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2277 pid=6218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363932336138343730646162663436373235626638383862613363 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2277 pid=6218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363932336138343730646162663436373235626638383862613363 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.384000 audit: BPF prog-id=190 op=LOAD Oct 2 20:41:30.384000 audit[6218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2277 pid=6218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363932336138343730646162663436373235626638383862613363 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit: BPF prog-id=191 op=LOAD Oct 2 20:41:30.385000 audit[6218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2277 pid=6218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363932336138343730646162663436373235626638383862613363 Oct 2 20:41:30.385000 audit: BPF prog-id=191 op=UNLOAD Oct 2 20:41:30.385000 audit: BPF prog-id=190 op=UNLOAD Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { perfmon } for pid=6218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit[6218]: AVC avc: denied { bpf } for pid=6218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.385000 audit: BPF prog-id=192 op=LOAD Oct 2 20:41:30.385000 audit[6218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2277 pid=6218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363932336138343730646162663436373235626638383862613363 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.395000 audit: BPF prog-id=193 op=LOAD Oct 2 20:41:30.400000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.400000 audit[6231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2216 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343431316430643765313838376635393466346466336637646533 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2216 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343431316430643765313838376635393466346466336637646533 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.401000 audit: BPF prog-id=194 op=LOAD Oct 2 20:41:30.401000 audit[6231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2216 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343431316430643765313838376635393466346466336637646533 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.402000 audit: BPF prog-id=195 op=LOAD Oct 2 20:41:30.402000 audit[6231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2216 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343431316430643765313838376635393466346466336637646533 Oct 2 20:41:30.402000 audit: BPF prog-id=195 op=UNLOAD Oct 2 20:41:30.403000 audit: BPF prog-id=194 op=UNLOAD Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { perfmon } for pid=6231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit[6231]: AVC avc: denied { bpf } for pid=6231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:30.403000 audit: BPF prog-id=196 op=LOAD Oct 2 20:41:30.403000 audit[6231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2216 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:30.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343431316430643765313838376635393466346466336637646533 Oct 2 20:41:30.425683 env[1350]: time="2023-10-02T20:41:30.425640147Z" level=info msg="StartContainer for \"256923a8470dabf46725bf888ba3c59851cdf576c295f56ce5f65575da66f597\" returns successfully" Oct 2 20:41:30.445185 env[1350]: time="2023-10-02T20:41:30.445141224Z" level=info msg="StartContainer for \"064411d0d7e1887f594f4df3f7de322780fb5e79a3454292003d05ca9f2dbfe5\" returns successfully" Oct 2 20:41:30.899808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3499889277.mount: Deactivated successfully. Oct 2 20:41:31.309239 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.RAOI9o.mount: Deactivated successfully. Oct 2 20:41:31.955000 audit[6246]: AVC avc: denied { watch } for pid=6246 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:31.955000 audit[6246]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013c450 a2=fc6 a3=0 items=0 ppid=2277 pid=6246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:31.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:31.956000 audit[6246]: AVC avc: denied { watch } for pid=6246 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:31.956000 audit[6246]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40011f0040 a2=fc6 a3=0 items=0 ppid=2277 pid=6246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c598,c612 key=(null) Oct 2 20:41:31.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:32.756758 env[1350]: time="2023-10-02T20:41:32.756470245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:41:32.928643 env[1350]: time="2023-10-02T20:41:32.928412168Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:32.931195 env[1350]: time="2023-10-02T20:41:32.931109118Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:32.931644 kubelet[2520]: E1002 20:41:32.931437 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:32.931644 kubelet[2520]: E1002 20:41:32.931490 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:41:32.931644 kubelet[2520]: E1002 20:41:32.931607 2520 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:32.932977 env[1350]: time="2023-10-02T20:41:32.932942406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:41:33.138867 env[1350]: time="2023-10-02T20:41:33.138710821Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:33.141761 env[1350]: time="2023-10-02T20:41:33.141709578Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:33.142263 kubelet[2520]: E1002 20:41:33.142026 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:33.142263 kubelet[2520]: E1002 20:41:33.142077 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:41:33.142263 kubelet[2520]: E1002 20:41:33.142172 2520 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bl6kc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-kk5x4_calico-system(f80acaac-1174-4751-8af1-1b7ba97c4d9f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:33.142263 kubelet[2520]: E1002 20:41:33.142232 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:41:37.756856 kubelet[2520]: E1002 20:41:37.756821 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-n2xtl" podUID=289f1a6e-3689-40ce-9443-3f8798dfd3ff Oct 2 20:41:39.253324 kubelet[2520]: E1002 20:41:39.253241 2520 controller.go:189] failed to update lease, error: Put "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:41.080944 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.v9KA0Q.mount: Deactivated successfully. Oct 2 20:41:41.756519 env[1350]: time="2023-10-02T20:41:41.756466338Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:41:41.911629 env[1350]: time="2023-10-02T20:41:41.911529769Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:41:41.915378 env[1350]: time="2023-10-02T20:41:41.915339621Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:41:41.915585 kubelet[2520]: E1002 20:41:41.915551 2520 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:41:41.915851 kubelet[2520]: E1002 20:41:41.915619 2520 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:41:41.915851 kubelet[2520]: E1002 20:41:41.915711 2520 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wfr8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-7dc7577b7f-9rtpx_calico-apiserver(d04d6efc-69f7-4909-a546-23e6e8bb621e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:41:41.915851 kubelet[2520]: E1002 20:41:41.915745 2520 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dc7577b7f-9rtpx" podUID=d04d6efc-69f7-4909-a546-23e6e8bb621e Oct 2 20:41:42.076481 systemd[1]: run-containerd-runc-k8s.io-8905e468422dd7a84582f5b2864bfb7a9405f31324947864f3aa82d5ef61c2bf-runc.DDCs1j.mount: Deactivated successfully. Oct 2 20:41:47.756346 kubelet[2520]: E1002 20:41:47.756313 2520 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-kk5x4" podUID=f80acaac-1174-4751-8af1-1b7ba97c4d9f Oct 2 20:41:49.253691 kubelet[2520]: E1002 20:41:49.253646 2520 controller.go:189] failed to update lease, error: Put "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-855b1f86a1?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 20:41:50.646238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#167 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.646569 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#166 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.646715 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#169 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.653374 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#171 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.661482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.669368 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#173 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.677431 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#168 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.685362 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#172 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.709818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#172 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.710063 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#168 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.717537 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#173 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.725845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.733796 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#171 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.742130 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#169 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.749731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#166 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.757682 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#167 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.774260 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#167 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.774490 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#166 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.782307 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#169 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.790310 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#171 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.797913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.805358 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#173 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.812734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#168 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.820559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#172 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.828126 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.836156 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#118 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.843602 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#119 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.851482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.859138 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.866841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#122 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.874486 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#123 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.882291 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#124 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.889805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#125 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.897473 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#126 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.904707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#127 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.912162 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.919436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#65 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.926987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#66 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.934199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#67 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.941538 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#68 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.948744 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#69 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.955915 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#70 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.963137 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#71 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.970567 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#72 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.978154 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#73 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.985415 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:50.992887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#75 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.011139 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#172 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.011448 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#118 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.018525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#117 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.025769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#168 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.033416 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#173 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.040824 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#119 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.048301 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.056122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.063704 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#171 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.072452 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#169 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.080518 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.088325 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#122 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.095844 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#166 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.103276 systemd[1]: run-containerd-runc-k8s.io-ccc303caad6805e684070afd199c5a885c497586426469e132dc1213cb60bc54-runc.zxHDiQ.mount: Deactivated successfully. Oct 2 20:41:51.104924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#123 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.112988 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#124 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.120549 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#167 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.128136 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#125 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.135521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#126 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.143262 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#127 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.150819 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:51.158408 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#65 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001