Oct 2 20:35:49.103329 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 20:35:49.103346 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 20:35:49.103354 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Oct 2 20:35:49.103362 kernel: printk: bootconsole [pl11] enabled Oct 2 20:35:49.103366 kernel: efi: EFI v2.70 by EDK II Oct 2 20:35:49.103372 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 Oct 2 20:35:49.103378 kernel: random: crng init done Oct 2 20:35:49.103384 kernel: ACPI: Early table checksum verification disabled Oct 2 20:35:49.103389 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL) Oct 2 20:35:49.103394 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103400 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103407 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 20:35:49.103412 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103417 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103424 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103430 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103435 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103442 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103448 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Oct 2 20:35:49.103454 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 20:35:49.103459 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Oct 2 20:35:49.103465 kernel: NUMA: Failed to initialise from firmware Oct 2 20:35:49.103470 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:49.103476 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Oct 2 20:35:49.103482 kernel: Zone ranges: Oct 2 20:35:49.103487 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Oct 2 20:35:49.103493 kernel: DMA32 empty Oct 2 20:35:49.103499 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:49.103505 kernel: Movable zone start for each node Oct 2 20:35:49.103510 kernel: Early memory node ranges Oct 2 20:35:49.103516 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Oct 2 20:35:49.103521 kernel: node 0: [mem 0x0000000000824000-0x000000003ec84fff] Oct 2 20:35:49.103527 kernel: node 0: [mem 0x000000003ec85000-0x000000003ecadfff] Oct 2 20:35:49.103533 kernel: node 0: [mem 0x000000003ecae000-0x000000003fd2dfff] Oct 2 20:35:49.103538 kernel: node 0: [mem 0x000000003fd2e000-0x000000003fd81fff] Oct 2 20:35:49.103544 kernel: node 0: [mem 0x000000003fd82000-0x000000003fd8dfff] Oct 2 20:35:49.103549 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fd91fff] Oct 2 20:35:49.103555 kernel: node 0: [mem 0x000000003fd92000-0x000000003fffffff] Oct 2 20:35:49.103560 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Oct 2 20:35:49.103567 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Oct 2 20:35:49.103575 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Oct 2 20:35:49.103581 kernel: psci: probing for conduit method from ACPI. Oct 2 20:35:49.103588 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 20:35:49.103594 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 20:35:49.103601 kernel: psci: MIGRATE_INFO_TYPE not supported. Oct 2 20:35:49.103607 kernel: psci: SMC Calling Convention v1.4 Oct 2 20:35:49.103613 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Oct 2 20:35:49.103618 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Oct 2 20:35:49.103624 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 20:35:49.103630 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 20:35:49.103637 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 20:35:49.103642 kernel: Detected PIPT I-cache on CPU0 Oct 2 20:35:49.103648 kernel: CPU features: detected: GIC system register CPU interface Oct 2 20:35:49.103654 kernel: CPU features: detected: Hardware dirty bit management Oct 2 20:35:49.103660 kernel: CPU features: detected: Spectre-BHB Oct 2 20:35:49.103666 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 20:35:49.109119 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 20:35:49.109132 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 20:35:49.109138 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Oct 2 20:35:49.109145 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Oct 2 20:35:49.109151 kernel: Policy zone: Normal Oct 2 20:35:49.109159 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:49.109166 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:35:49.109172 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 20:35:49.109178 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:35:49.109185 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:35:49.109195 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB) Oct 2 20:35:49.109202 kernel: Memory: 3992060K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202100K reserved, 0K cma-reserved) Oct 2 20:35:49.109208 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 20:35:49.109214 kernel: trace event string verifier disabled Oct 2 20:35:49.109220 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 20:35:49.109227 kernel: rcu: RCU event tracing is enabled. Oct 2 20:35:49.109233 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 20:35:49.109239 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 20:35:49.109245 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:35:49.109252 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:35:49.109258 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 20:35:49.109265 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 20:35:49.109271 kernel: GICv3: 960 SPIs implemented Oct 2 20:35:49.109278 kernel: GICv3: 0 Extended SPIs implemented Oct 2 20:35:49.109284 kernel: GICv3: Distributor has no Range Selector support Oct 2 20:35:49.109290 kernel: Root IRQ handler: gic_handle_irq Oct 2 20:35:49.109296 kernel: GICv3: 16 PPIs implemented Oct 2 20:35:49.109302 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Oct 2 20:35:49.109308 kernel: ITS: No ITS available, not enabling LPIs Oct 2 20:35:49.109314 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:49.109320 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 20:35:49.109326 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 20:35:49.109333 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 20:35:49.109340 kernel: Console: colour dummy device 80x25 Oct 2 20:35:49.109347 kernel: printk: console [tty1] enabled Oct 2 20:35:49.109353 kernel: ACPI: Core revision 20210730 Oct 2 20:35:49.109360 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 20:35:49.109366 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:35:49.109373 kernel: LSM: Security Framework initializing Oct 2 20:35:49.109379 kernel: SELinux: Initializing. Oct 2 20:35:49.109385 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.109391 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.109399 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Oct 2 20:35:49.109405 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0 Oct 2 20:35:49.109412 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:35:49.109418 kernel: Remapping and enabling EFI services. Oct 2 20:35:49.109424 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:35:49.109430 kernel: Detected PIPT I-cache on CPU1 Oct 2 20:35:49.109437 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Oct 2 20:35:49.109443 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 20:35:49.109450 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 20:35:49.109457 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 20:35:49.109463 kernel: SMP: Total of 2 processors activated. Oct 2 20:35:49.109469 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 20:35:49.109476 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Oct 2 20:35:49.109482 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 20:35:49.109489 kernel: CPU features: detected: CRC32 instructions Oct 2 20:35:49.109495 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 20:35:49.109501 kernel: CPU features: detected: LSE atomic instructions Oct 2 20:35:49.109508 kernel: CPU features: detected: Privileged Access Never Oct 2 20:35:49.109515 kernel: CPU: All CPU(s) started at EL1 Oct 2 20:35:49.109522 kernel: alternatives: patching kernel code Oct 2 20:35:49.109532 kernel: devtmpfs: initialized Oct 2 20:35:49.109540 kernel: KASLR enabled Oct 2 20:35:49.109547 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:35:49.109553 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 20:35:49.109560 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:35:49.109567 kernel: SMBIOS 3.1.0 present. Oct 2 20:35:49.109573 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022 Oct 2 20:35:49.109580 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:35:49.109588 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 20:35:49.109595 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 20:35:49.109601 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 20:35:49.109608 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:35:49.109614 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Oct 2 20:35:49.109621 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:35:49.109628 kernel: cpuidle: using governor menu Oct 2 20:35:49.109636 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 20:35:49.109642 kernel: ASID allocator initialised with 32768 entries Oct 2 20:35:49.109649 kernel: ACPI: bus type PCI registered Oct 2 20:35:49.109655 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:35:49.109662 kernel: Serial: AMBA PL011 UART driver Oct 2 20:35:49.109669 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:35:49.109700 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 20:35:49.109706 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:35:49.109713 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 20:35:49.109721 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:35:49.109728 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 20:35:49.109735 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:35:49.109741 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:35:49.109748 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:35:49.109754 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:35:49.109761 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:35:49.109768 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:35:49.109774 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:35:49.109782 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 20:35:49.109789 kernel: ACPI: Interpreter enabled Oct 2 20:35:49.109795 kernel: ACPI: Using GIC for interrupt routing Oct 2 20:35:49.109802 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Oct 2 20:35:49.109808 kernel: printk: console [ttyAMA0] enabled Oct 2 20:35:49.109815 kernel: printk: bootconsole [pl11] disabled Oct 2 20:35:49.109822 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Oct 2 20:35:49.109828 kernel: iommu: Default domain type: Translated Oct 2 20:35:49.109835 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 20:35:49.109842 kernel: vgaarb: loaded Oct 2 20:35:49.109849 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:35:49.109856 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:35:49.109862 kernel: PTP clock support registered Oct 2 20:35:49.109869 kernel: Registered efivars operations Oct 2 20:35:49.109876 kernel: No ACPI PMU IRQ for CPU0 Oct 2 20:35:49.109882 kernel: No ACPI PMU IRQ for CPU1 Oct 2 20:35:49.109888 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 20:35:49.109895 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:35:49.109903 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:35:49.109909 kernel: pnp: PnP ACPI init Oct 2 20:35:49.109916 kernel: pnp: PnP ACPI: found 0 devices Oct 2 20:35:49.109923 kernel: NET: Registered PF_INET protocol family Oct 2 20:35:49.109929 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:35:49.109936 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 20:35:49.109943 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:35:49.109950 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 20:35:49.109956 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 20:35:49.109964 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 20:35:49.109971 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.109977 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 20:35:49.109984 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:35:49.109991 kernel: PCI: CLS 0 bytes, default 64 Oct 2 20:35:49.109998 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Oct 2 20:35:49.110004 kernel: kvm [1]: HYP mode not available Oct 2 20:35:49.110011 kernel: Initialise system trusted keyrings Oct 2 20:35:49.110017 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 20:35:49.110025 kernel: Key type asymmetric registered Oct 2 20:35:49.110032 kernel: Asymmetric key parser 'x509' registered Oct 2 20:35:49.110038 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:35:49.110045 kernel: io scheduler mq-deadline registered Oct 2 20:35:49.110052 kernel: io scheduler kyber registered Oct 2 20:35:49.110058 kernel: io scheduler bfq registered Oct 2 20:35:49.110065 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:35:49.110071 kernel: thunder_xcv, ver 1.0 Oct 2 20:35:49.110077 kernel: thunder_bgx, ver 1.0 Oct 2 20:35:49.110085 kernel: nicpf, ver 1.0 Oct 2 20:35:49.110092 kernel: nicvf, ver 1.0 Oct 2 20:35:49.110269 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 20:35:49.110331 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:35:48 UTC (1696278948) Oct 2 20:35:49.110340 kernel: efifb: probing for efifb Oct 2 20:35:49.110347 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 20:35:49.110354 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 20:35:49.110360 kernel: efifb: scrolling: redraw Oct 2 20:35:49.110369 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 20:35:49.110376 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:35:49.110383 kernel: fb0: EFI VGA frame buffer device Oct 2 20:35:49.110389 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Oct 2 20:35:49.110396 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:35:49.110403 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:35:49.110410 kernel: Segment Routing with IPv6 Oct 2 20:35:49.110416 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:35:49.110423 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:35:49.110431 kernel: Key type dns_resolver registered Oct 2 20:35:49.110437 kernel: registered taskstats version 1 Oct 2 20:35:49.110444 kernel: Loading compiled-in X.509 certificates Oct 2 20:35:49.110451 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 20:35:49.110457 kernel: Key type .fscrypt registered Oct 2 20:35:49.110464 kernel: Key type fscrypt-provisioning registered Oct 2 20:35:49.110470 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 20:35:49.110477 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:35:49.110483 kernel: ima: No architecture policies found Oct 2 20:35:49.110491 kernel: Freeing unused kernel memory: 34560K Oct 2 20:35:49.110497 kernel: Run /init as init process Oct 2 20:35:49.110504 kernel: with arguments: Oct 2 20:35:49.110511 kernel: /init Oct 2 20:35:49.110517 kernel: with environment: Oct 2 20:35:49.110523 kernel: HOME=/ Oct 2 20:35:49.110529 kernel: TERM=linux Oct 2 20:35:49.110536 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:35:49.110544 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:35:49.110554 systemd[1]: Detected virtualization microsoft. Oct 2 20:35:49.110562 systemd[1]: Detected architecture arm64. Oct 2 20:35:49.110569 systemd[1]: Running in initrd. Oct 2 20:35:49.110576 systemd[1]: No hostname configured, using default hostname. Oct 2 20:35:49.110582 systemd[1]: Hostname set to . Oct 2 20:35:49.110590 systemd[1]: Initializing machine ID from random generator. Oct 2 20:35:49.110597 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:35:49.110605 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:35:49.110612 systemd[1]: Reached target cryptsetup.target. Oct 2 20:35:49.110619 systemd[1]: Reached target paths.target. Oct 2 20:35:49.110626 systemd[1]: Reached target slices.target. Oct 2 20:35:49.110633 systemd[1]: Reached target swap.target. Oct 2 20:35:49.110639 systemd[1]: Reached target timers.target. Oct 2 20:35:49.110647 systemd[1]: Listening on iscsid.socket. Oct 2 20:35:49.110654 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:35:49.110662 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:35:49.110669 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:35:49.127056 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:35:49.127066 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:35:49.127074 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:35:49.127082 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:35:49.127089 systemd[1]: Reached target sockets.target. Oct 2 20:35:49.127097 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:35:49.127107 systemd[1]: Finished network-cleanup.service. Oct 2 20:35:49.127119 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:35:49.127126 systemd[1]: Starting systemd-journald.service... Oct 2 20:35:49.127133 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:35:49.127140 systemd[1]: Starting systemd-resolved.service... Oct 2 20:35:49.127147 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:35:49.127155 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:35:49.127162 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:35:49.127174 systemd-journald[276]: Journal started Oct 2 20:35:49.127228 systemd-journald[276]: Runtime Journal (/run/log/journal/6e5a25f9412b449a9739f69438c45a79) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:35:49.084669 systemd-modules-load[277]: Inserted module 'overlay' Oct 2 20:35:49.140635 kernel: Bridge firewalling registered Oct 2 20:35:49.123224 systemd-resolved[278]: Positive Trust Anchors: Oct 2 20:35:49.123232 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:35:49.218122 kernel: audit: type=1130 audit(1696278949.153:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.218145 kernel: SCSI subsystem initialized Oct 2 20:35:49.218154 systemd[1]: Started systemd-resolved.service. Oct 2 20:35:49.218165 kernel: audit: type=1130 audit(1696278949.182:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.218174 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:35:49.218183 systemd[1]: Started systemd-journald.service. Oct 2 20:35:49.218192 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:35:49.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.123259 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:35:49.260767 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:35:49.126151 systemd-resolved[278]: Defaulting to hostname 'linux'. Oct 2 20:35:49.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.136430 systemd-modules-load[277]: Inserted module 'br_netfilter' Oct 2 20:35:49.259748 systemd-modules-load[277]: Inserted module 'dm_multipath' Oct 2 20:35:49.288407 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:35:49.329035 kernel: audit: type=1130 audit(1696278949.265:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.329056 kernel: audit: type=1130 audit(1696278949.297:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.298378 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:35:49.325061 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:35:49.378624 kernel: audit: type=1130 audit(1696278949.324:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.378654 kernel: audit: type=1130 audit(1696278949.333:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.334085 systemd[1]: Reached target nss-lookup.target. Oct 2 20:35:49.363177 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:35:49.388757 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:35:49.405541 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:35:49.419777 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:35:49.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.447595 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:35:49.456161 kernel: audit: type=1130 audit(1696278949.426:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.452434 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:35:49.500575 kernel: audit: type=1130 audit(1696278949.451:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.500599 kernel: audit: type=1130 audit(1696278949.475:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.494035 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:35:49.516200 dracut-cmdline[298]: dracut-dracut-053 Oct 2 20:35:49.520976 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 20:35:49.639698 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:35:49.651689 kernel: iscsi: registered transport (tcp) Oct 2 20:35:49.672591 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:35:49.672645 kernel: QLogic iSCSI HBA Driver Oct 2 20:35:49.747489 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:35:49.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:49.753332 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:35:49.820711 kernel: raid6: neonx8 gen() 13817 MB/s Oct 2 20:35:49.838688 kernel: raid6: neonx8 xor() 10821 MB/s Oct 2 20:35:49.859683 kernel: raid6: neonx4 gen() 13539 MB/s Oct 2 20:35:49.879687 kernel: raid6: neonx4 xor() 11326 MB/s Oct 2 20:35:49.900687 kernel: raid6: neonx2 gen() 13105 MB/s Oct 2 20:35:49.920687 kernel: raid6: neonx2 xor() 10235 MB/s Oct 2 20:35:49.940687 kernel: raid6: neonx1 gen() 10507 MB/s Oct 2 20:35:49.961688 kernel: raid6: neonx1 xor() 8786 MB/s Oct 2 20:35:49.981682 kernel: raid6: int64x8 gen() 6298 MB/s Oct 2 20:35:50.001686 kernel: raid6: int64x8 xor() 3551 MB/s Oct 2 20:35:50.022686 kernel: raid6: int64x4 gen() 7249 MB/s Oct 2 20:35:50.042686 kernel: raid6: int64x4 xor() 3848 MB/s Oct 2 20:35:50.062686 kernel: raid6: int64x2 gen() 6153 MB/s Oct 2 20:35:50.083688 kernel: raid6: int64x2 xor() 3320 MB/s Oct 2 20:35:50.103686 kernel: raid6: int64x1 gen() 5044 MB/s Oct 2 20:35:50.127971 kernel: raid6: int64x1 xor() 2648 MB/s Oct 2 20:35:50.127988 kernel: raid6: using algorithm neonx8 gen() 13817 MB/s Oct 2 20:35:50.128004 kernel: raid6: .... xor() 10821 MB/s, rmw enabled Oct 2 20:35:50.133203 kernel: raid6: using neon recovery algorithm Oct 2 20:35:50.154223 kernel: xor: measuring software checksum speed Oct 2 20:35:50.154235 kernel: 8regs : 17322 MB/sec Oct 2 20:35:50.158684 kernel: 32regs : 20760 MB/sec Oct 2 20:35:50.167454 kernel: arm64_neon : 27750 MB/sec Oct 2 20:35:50.167464 kernel: xor: using function: arm64_neon (27750 MB/sec) Oct 2 20:35:50.222692 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 20:35:50.238990 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:35:50.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.247000 audit: BPF prog-id=7 op=LOAD Oct 2 20:35:50.247000 audit: BPF prog-id=8 op=LOAD Oct 2 20:35:50.248988 systemd[1]: Starting systemd-udevd.service... Oct 2 20:35:50.270125 systemd-udevd[475]: Using default interface naming scheme 'v252'. Oct 2 20:35:50.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.277473 systemd[1]: Started systemd-udevd.service. Oct 2 20:35:50.288292 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:35:50.317766 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Oct 2 20:35:50.368924 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:35:50.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.374372 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:35:50.417535 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:35:50.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:50.477694 kernel: hv_vmbus: Vmbus version:5.3 Oct 2 20:35:50.494695 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 20:35:50.494764 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 20:35:50.516928 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 20:35:50.516991 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 20:35:50.517001 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 20:35:50.535838 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 20:35:50.535892 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 20:35:50.545371 kernel: scsi host0: storvsc_host_t Oct 2 20:35:50.545561 kernel: scsi host1: storvsc_host_t Oct 2 20:35:50.545585 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 20:35:50.558479 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 20:35:50.584067 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 20:35:50.584293 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 20:35:50.584304 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 20:35:50.588992 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:35:50.593091 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:35:50.599921 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 20:35:50.600052 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 20:35:50.601703 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 20:35:50.606690 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:50.612287 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:35:50.632695 kernel: hv_netvsc 002248b6-c41d-0022-48b6-c41d002248b6 eth0: VF slot 1 added Oct 2 20:35:50.644504 kernel: hv_vmbus: registering driver hv_pci Oct 2 20:35:50.655090 kernel: hv_pci 7c595ca3-6820-4b90-b2b7-7964a6222711: PCI VMBus probing: Using version 0x10004 Oct 2 20:35:50.668012 kernel: hv_pci 7c595ca3-6820-4b90-b2b7-7964a6222711: PCI host bridge to bus 6820:00 Oct 2 20:35:50.668177 kernel: pci_bus 6820:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Oct 2 20:35:50.674686 kernel: pci_bus 6820:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 20:35:50.681839 kernel: pci 6820:00:02.0: [15b3:1018] type 00 class 0x020000 Oct 2 20:35:50.694717 kernel: pci 6820:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:50.934975 kernel: pci 6820:00:02.0: enabling Extended Tags Oct 2 20:35:50.958699 kernel: pci 6820:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 6820:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Oct 2 20:35:50.958931 kernel: pci_bus 6820:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 20:35:50.959013 kernel: pci 6820:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Oct 2 20:35:51.005694 kernel: mlx5_core 6820:00:02.0: firmware version: 16.31.2424 Oct 2 20:35:51.168690 kernel: mlx5_core 6820:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Oct 2 20:35:51.257891 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:35:51.305643 kernel: hv_netvsc 002248b6-c41d-0022-48b6-c41d002248b6 eth0: VF registering: eth1 Oct 2 20:35:51.305870 kernel: mlx5_core 6820:00:02.0 eth1: joined to eth0 Oct 2 20:35:51.318704 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (526) Oct 2 20:35:51.325695 kernel: mlx5_core 6820:00:02.0 enP26656s1: renamed from eth1 Oct 2 20:35:51.342189 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:35:51.446815 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:35:51.468778 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:35:51.474952 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:35:51.486665 systemd[1]: Starting disk-uuid.service... Oct 2 20:35:51.510700 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:51.518689 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:52.527703 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:35:52.527756 disk-uuid[603]: The operation has completed successfully. Oct 2 20:35:52.607619 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:35:52.610840 systemd[1]: Finished disk-uuid.service. Oct 2 20:35:52.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.620318 systemd[1]: Starting verity-setup.service... Oct 2 20:35:52.662695 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 20:35:52.902908 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:35:52.909163 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:35:52.923706 systemd[1]: Finished verity-setup.service. Oct 2 20:35:52.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:52.978710 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:35:52.978861 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:35:52.982667 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:35:52.983399 systemd[1]: Starting ignition-setup.service... Oct 2 20:35:52.990565 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:35:53.029996 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:53.030039 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:53.034352 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:53.108128 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 20:35:53.153797 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:35:53.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.184890 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 20:35:53.184952 kernel: audit: type=1130 audit(1696278953.158:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.184000 audit: BPF prog-id=9 op=LOAD Oct 2 20:35:53.190438 kernel: audit: type=1334 audit(1696278953.184:22): prog-id=9 op=LOAD Oct 2 20:35:53.190701 systemd[1]: Starting systemd-networkd.service... Oct 2 20:35:53.218656 systemd-networkd[848]: lo: Link UP Oct 2 20:35:53.218669 systemd-networkd[848]: lo: Gained carrier Oct 2 20:35:53.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.219356 systemd-networkd[848]: Enumeration completed Oct 2 20:35:53.222074 systemd[1]: Started systemd-networkd.service. Oct 2 20:35:53.258847 kernel: audit: type=1130 audit(1696278953.226:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.243659 systemd[1]: Reached target network.target. Oct 2 20:35:53.245156 systemd-networkd[848]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:35:53.257358 systemd[1]: Starting iscsiuio.service... Oct 2 20:35:53.280383 systemd[1]: Started iscsiuio.service. Oct 2 20:35:53.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.293918 systemd[1]: Finished ignition-setup.service. Oct 2 20:35:53.311741 kernel: audit: type=1130 audit(1696278953.287:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.308750 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:35:53.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.332357 systemd[1]: Starting iscsid.service... Oct 2 20:35:53.349441 iscsid[855]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:53.349441 iscsid[855]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 20:35:53.349441 iscsid[855]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:35:53.349441 iscsid[855]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:35:53.349441 iscsid[855]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:35:53.349441 iscsid[855]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:35:53.349441 iscsid[855]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:35:53.474541 kernel: audit: type=1130 audit(1696278953.307:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.474571 kernel: audit: type=1130 audit(1696278953.363:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.474582 kernel: mlx5_core 6820:00:02.0 enP26656s1: Link up Oct 2 20:35:53.474768 kernel: audit: type=1130 audit(1696278953.446:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.352771 systemd[1]: Started iscsid.service. Oct 2 20:35:53.380946 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:35:53.439392 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:35:53.514650 kernel: hv_netvsc 002248b6-c41d-0022-48b6-c41d002248b6 eth0: Data path switched to VF: enP26656s1 Oct 2 20:35:53.514810 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:35:53.446780 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:35:53.479253 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:35:53.487340 systemd[1]: Reached target remote-fs.target. Oct 2 20:35:53.507661 systemd-networkd[848]: enP26656s1: Link UP Oct 2 20:35:53.507752 systemd-networkd[848]: eth0: Link UP Oct 2 20:35:53.563144 kernel: audit: type=1130 audit(1696278953.544:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:53.507982 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:35:53.517785 systemd-networkd[848]: eth0: Gained carrier Oct 2 20:35:53.530096 systemd-networkd[848]: enP26656s1: Gained carrier Oct 2 20:35:53.539078 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:35:53.543607 systemd-networkd[848]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:35:55.299821 systemd-networkd[848]: eth0: Gained IPv6LL Oct 2 20:35:56.035345 ignition[854]: Ignition 2.14.0 Oct 2 20:35:56.035355 ignition[854]: Stage: fetch-offline Oct 2 20:35:56.035405 ignition[854]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.035427 ignition[854]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.150847 ignition[854]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.151002 ignition[854]: parsed url from cmdline: "" Oct 2 20:35:56.157532 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:35:56.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.151006 ignition[854]: no config URL provided Oct 2 20:35:56.187883 kernel: audit: type=1130 audit(1696278956.162:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.183201 systemd[1]: Starting ignition-fetch.service... Oct 2 20:35:56.151012 ignition[854]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:56.151019 ignition[854]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:56.151024 ignition[854]: failed to fetch config: resource requires networking Oct 2 20:35:56.151384 ignition[854]: Ignition finished successfully Oct 2 20:35:56.202344 ignition[874]: Ignition 2.14.0 Oct 2 20:35:56.202351 ignition[874]: Stage: fetch Oct 2 20:35:56.202468 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.202496 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.205446 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.207334 ignition[874]: parsed url from cmdline: "" Oct 2 20:35:56.207340 ignition[874]: no config URL provided Oct 2 20:35:56.207346 ignition[874]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:35:56.207363 ignition[874]: no config at "/usr/lib/ignition/user.ign" Oct 2 20:35:56.207403 ignition[874]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 20:35:56.235768 ignition[874]: GET result: OK Oct 2 20:35:56.235846 ignition[874]: config has been read from IMDS userdata Oct 2 20:35:56.235898 ignition[874]: parsing config with SHA512: 69e126d7904e3ff32b70c39ca9239c254e3307348fced8a14226166fc3065464dc558125b0f2592e46cc7911f332bd92c2ebd5f72ef6b296eca76130befc014c Oct 2 20:35:56.272313 unknown[874]: fetched base config from "system" Oct 2 20:35:56.272329 unknown[874]: fetched base config from "system" Oct 2 20:35:56.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.272849 ignition[874]: fetch: fetch complete Oct 2 20:35:56.305936 kernel: audit: type=1130 audit(1696278956.281:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.272354 unknown[874]: fetched user config from "azure" Oct 2 20:35:56.272855 ignition[874]: fetch: fetch passed Oct 2 20:35:56.277303 systemd[1]: Finished ignition-fetch.service. Oct 2 20:35:56.272898 ignition[874]: Ignition finished successfully Oct 2 20:35:56.282580 systemd[1]: Starting ignition-kargs.service... Oct 2 20:35:56.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.318225 ignition[880]: Ignition 2.14.0 Oct 2 20:35:56.327760 systemd[1]: Finished ignition-kargs.service. Oct 2 20:35:56.318232 ignition[880]: Stage: kargs Oct 2 20:35:56.333221 systemd[1]: Starting ignition-disks.service... Oct 2 20:35:56.318340 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.318363 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.324138 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.325424 ignition[880]: kargs: kargs passed Oct 2 20:35:56.368798 systemd[1]: Finished ignition-disks.service. Oct 2 20:35:56.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.325484 ignition[880]: Ignition finished successfully Oct 2 20:35:56.376598 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:35:56.356716 ignition[886]: Ignition 2.14.0 Oct 2 20:35:56.385469 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:35:56.356722 ignition[886]: Stage: disks Oct 2 20:35:56.394012 systemd[1]: Reached target local-fs.target. Oct 2 20:35:56.356826 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:56.402499 systemd[1]: Reached target sysinit.target. Oct 2 20:35:56.356849 ignition[886]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:56.409663 systemd[1]: Reached target basic.target. Oct 2 20:35:56.360286 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:56.419116 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:35:56.367083 ignition[886]: disks: disks passed Oct 2 20:35:56.367160 ignition[886]: Ignition finished successfully Oct 2 20:35:56.506828 systemd-fsck[894]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks Oct 2 20:35:56.521818 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:35:56.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:56.527479 systemd[1]: Mounting sysroot.mount... Oct 2 20:35:56.555730 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:35:56.556087 systemd[1]: Mounted sysroot.mount. Oct 2 20:35:56.560020 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:35:56.600564 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:35:56.605106 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:35:56.609536 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:35:56.609569 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:35:56.615720 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:35:56.654285 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:35:56.659878 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:35:56.683107 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (905) Oct 2 20:35:56.697276 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:56.697324 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:56.697334 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:56.698275 initrd-setup-root[910]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:35:56.713470 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:35:56.741036 initrd-setup-root[936]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:35:56.753949 initrd-setup-root[944]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:35:56.767170 initrd-setup-root[952]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:35:57.187686 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:35:57.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.193107 systemd[1]: Starting ignition-mount.service... Oct 2 20:35:57.201278 systemd[1]: Starting sysroot-boot.service... Oct 2 20:35:57.221765 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:35:57.221864 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:35:57.244893 systemd[1]: Finished sysroot-boot.service. Oct 2 20:35:57.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.267541 ignition[976]: INFO : Ignition 2.14.0 Oct 2 20:35:57.271576 ignition[976]: INFO : Stage: mount Oct 2 20:35:57.271576 ignition[976]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:57.271576 ignition[976]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:57.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.299289 ignition[976]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:57.299289 ignition[976]: INFO : mount: mount passed Oct 2 20:35:57.299289 ignition[976]: INFO : Ignition finished successfully Oct 2 20:35:57.281926 systemd[1]: Finished ignition-mount.service. Oct 2 20:35:57.905642 coreos-metadata[904]: Oct 02 20:35:57.905 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 20:35:57.915600 coreos-metadata[904]: Oct 02 20:35:57.915 INFO Fetch successful Oct 2 20:35:57.949442 coreos-metadata[904]: Oct 02 20:35:57.949 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 20:35:57.976241 coreos-metadata[904]: Oct 02 20:35:57.976 INFO Fetch successful Oct 2 20:35:57.982693 coreos-metadata[904]: Oct 02 20:35:57.981 INFO wrote hostname ci-3510.3.0-a-96ab8c487b to /sysroot/etc/hostname Oct 2 20:35:57.991630 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:35:57.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:35:57.997548 systemd[1]: Starting ignition-files.service... Oct 2 20:35:58.015389 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:35:58.032696 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Oct 2 20:35:58.043965 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 20:35:58.043978 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:35:58.043988 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:35:58.052625 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:35:58.078880 ignition[1004]: INFO : Ignition 2.14.0 Oct 2 20:35:58.078880 ignition[1004]: INFO : Stage: files Oct 2 20:35:58.088383 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:35:58.088383 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:35:58.088383 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:35:58.088383 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:35:58.121536 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:35:58.121536 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:35:58.176053 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:35:58.183966 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:35:58.183966 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:35:58.176539 unknown[1004]: wrote ssh authorized keys file for user: core Oct 2 20:35:58.204582 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 20:35:58.204582 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 20:35:58.622397 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:35:59.174627 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 20:35:59.190838 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 20:35:59.190838 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 20:35:59.190838 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 20:35:59.515376 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:35:59.854637 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 20:35:59.871390 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 20:35:59.871390 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:35:59.871390 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Oct 2 20:35:59.964937 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:36:00.904779 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Oct 2 20:36:00.922396 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:36:00.922396 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:00.922396 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Oct 2 20:36:00.974513 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:36:01.709690 kernel: mlx5_core 6820:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count Oct 2 20:36:02.746244 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Oct 2 20:36:02.762928 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:36:02.762928 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:02.762928 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Oct 2 20:36:02.815142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 20:36:03.672207 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:03.688999 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:03.830056 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1008) Oct 2 20:36:03.830077 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 20:36:03.830092 kernel: audit: type=1130 audit(1696278963.783:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736915851" Oct 2 20:36:03.830142 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736915851": device or resource busy Oct 2 20:36:03.830142 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem736915851", trying btrfs: device or resource busy Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736915851" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736915851" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem736915851" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem736915851" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1373299618" Oct 2 20:36:03.830142 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1373299618": device or resource busy Oct 2 20:36:03.830142 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1373299618", trying btrfs: device or resource busy Oct 2 20:36:03.830142 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1373299618" Oct 2 20:36:04.105488 kernel: audit: type=1130 audit(1696278963.875:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.105516 kernel: audit: type=1131 audit(1696278963.875:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.105526 kernel: audit: type=1130 audit(1696278963.934:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.105544 kernel: audit: type=1130 audit(1696278964.030:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.105555 kernel: audit: type=1131 audit(1696278964.060:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.728417 systemd[1]: mnt-oem736915851.mount: Deactivated successfully. Oct 2 20:36:04.115909 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1373299618" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1373299618" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1373299618" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(13): [started] processing unit "nvidia.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(13): [finished] processing unit "nvidia.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(14): [started] processing unit "waagent.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(14): [finished] processing unit "waagent.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(1a): [started] setting preset to enabled for "waagent.service" Oct 2 20:36:04.115909 ignition[1004]: INFO : files: op(1a): [finished] setting preset to enabled for "waagent.service" Oct 2 20:36:04.393406 kernel: audit: type=1130 audit(1696278964.156:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.393435 kernel: audit: type=1131 audit(1696278964.237:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.753203 systemd[1]: mnt-oem1373299618.mount: Deactivated successfully. Oct 2 20:36:04.402048 ignition[1004]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:36:04.402048 ignition[1004]: INFO : files: files passed Oct 2 20:36:04.402048 ignition[1004]: INFO : Ignition finished successfully Oct 2 20:36:04.531761 kernel: audit: type=1131 audit(1696278964.405:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.531786 kernel: audit: type=1131 audit(1696278964.448:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.531920 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:36:03.769988 systemd[1]: Finished ignition-files.service. Oct 2 20:36:03.786077 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:36:03.819782 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:36:04.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.829130 systemd[1]: Starting ignition-quench.service... Oct 2 20:36:04.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.845690 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:36:04.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.845786 systemd[1]: Finished ignition-quench.service. Oct 2 20:36:04.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.929504 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:36:04.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.618925 ignition[1042]: INFO : Ignition 2.14.0 Oct 2 20:36:04.618925 ignition[1042]: INFO : Stage: umount Oct 2 20:36:04.618925 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:36:04.618925 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 20:36:04.618925 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 20:36:04.618925 ignition[1042]: INFO : umount: umount passed Oct 2 20:36:04.618925 ignition[1042]: INFO : Ignition finished successfully Oct 2 20:36:04.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:03.935361 systemd[1]: Reached target ignition-complete.target. Oct 2 20:36:03.977024 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:36:04.018545 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:36:04.018649 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:36:04.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.060849 systemd[1]: Reached target initrd-fs.target. Oct 2 20:36:04.091641 systemd[1]: Reached target initrd.target. Oct 2 20:36:04.110631 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:36:04.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.111477 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:36:04.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.144627 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:36:04.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.157753 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:36:04.795000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:36:04.196458 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:36:04.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.204886 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:36:04.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.216015 systemd[1]: Stopped target timers.target. Oct 2 20:36:04.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.226499 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:36:04.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.226559 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:36:04.237664 systemd[1]: Stopped target initrd.target. Oct 2 20:36:04.270749 systemd[1]: Stopped target basic.target. Oct 2 20:36:04.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.285866 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:36:04.297553 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:36:04.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.309065 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:36:04.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.324713 systemd[1]: Stopped target remote-fs.target. Oct 2 20:36:04.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.339793 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:36:04.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.351014 systemd[1]: Stopped target sysinit.target. Oct 2 20:36:04.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.362285 systemd[1]: Stopped target local-fs.target. Oct 2 20:36:04.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.373968 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:36:04.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.385984 systemd[1]: Stopped target swap.target. Oct 2 20:36:04.397149 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:36:04.968593 kernel: hv_netvsc 002248b6-c41d-0022-48b6-c41d002248b6 eth0: Data path switched from VF: enP26656s1 Oct 2 20:36:04.397206 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:36:04.406222 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:36:04.435309 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:36:04.435360 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:36:04.448358 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:36:04.448396 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:36:04.478457 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:36:04.478505 systemd[1]: Stopped ignition-files.service. Oct 2 20:36:04.490464 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:36:04.490503 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:36:04.514522 systemd[1]: Stopping ignition-mount.service... Oct 2 20:36:04.536604 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:36:04.552391 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:36:04.552478 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:36:04.562680 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:36:04.562728 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:36:04.567976 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:36:04.568066 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:36:04.583856 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:36:04.583941 systemd[1]: Stopped ignition-mount.service. Oct 2 20:36:04.592382 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:36:04.592437 systemd[1]: Stopped ignition-disks.service. Oct 2 20:36:04.601909 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:36:04.601956 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:36:04.610268 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 20:36:04.610310 systemd[1]: Stopped ignition-fetch.service. Oct 2 20:36:04.625934 systemd[1]: Stopped target network.target. Oct 2 20:36:04.636026 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:36:04.642742 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:36:05.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:04.651857 systemd[1]: Stopped target paths.target. Oct 2 20:36:04.663325 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:36:04.686095 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:36:04.692189 systemd[1]: Stopped target slices.target. Oct 2 20:36:04.702261 systemd[1]: Stopped target sockets.target. Oct 2 20:36:04.712232 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:36:04.712265 systemd[1]: Closed iscsid.socket. Oct 2 20:36:04.722131 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:36:04.722159 systemd[1]: Closed iscsiuio.socket. Oct 2 20:36:04.730466 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:36:05.185003 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Oct 2 20:36:05.185038 iscsid[855]: iscsid shutting down. Oct 2 20:36:04.730505 systemd[1]: Stopped ignition-setup.service. Oct 2 20:36:04.740299 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:04.748639 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:36:04.756891 systemd-networkd[848]: eth0: DHCPv6 lease lost Oct 2 20:36:05.184000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:36:04.759390 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:36:04.759910 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:04.760000 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:04.767205 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:36:04.767281 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:36:04.779259 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:36:04.779357 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:36:04.787635 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:36:04.787669 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:36:04.795767 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:36:04.795810 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:36:04.804800 systemd[1]: Stopping network-cleanup.service... Oct 2 20:36:04.812972 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:36:04.813026 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:36:04.817718 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:36:04.817764 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:36:04.829928 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:36:04.829964 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:36:04.834809 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:36:04.844644 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:36:04.847596 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:36:04.847798 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:36:04.856643 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:36:04.856702 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:36:04.861578 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:36:04.861615 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:36:04.870520 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:36:04.870573 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:36:04.879609 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:36:04.879649 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:36:04.888160 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:36:04.888197 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:36:04.898270 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:36:04.907734 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 20:36:04.907795 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 20:36:04.921440 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:36:04.921488 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:36:04.926299 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:36:04.926338 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:36:04.936348 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 20:36:04.936822 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:36:04.936922 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:36:05.099764 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:36:05.099868 systemd[1]: Stopped network-cleanup.service. Oct 2 20:36:05.109306 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:36:05.119629 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:36:05.142959 systemd[1]: Switching root. Oct 2 20:36:05.186405 systemd-journald[276]: Journal stopped Oct 2 20:36:15.649100 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:36:15.649120 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:36:15.649131 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:36:15.649140 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:36:15.649148 kernel: SELinux: policy capability open_perms=1 Oct 2 20:36:15.649156 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:36:15.649165 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:36:15.649173 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:36:15.649180 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:36:15.649188 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:36:15.649197 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:36:15.649207 systemd[1]: Successfully loaded SELinux policy in 279.257ms. Oct 2 20:36:15.649217 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.734ms. Oct 2 20:36:15.649227 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:36:15.649239 systemd[1]: Detected virtualization microsoft. Oct 2 20:36:15.649248 systemd[1]: Detected architecture arm64. Oct 2 20:36:15.649256 systemd[1]: Detected first boot. Oct 2 20:36:15.649265 systemd[1]: Hostname set to . Oct 2 20:36:15.649274 systemd[1]: Initializing machine ID from random generator. Oct 2 20:36:15.649283 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:36:15.649292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:36:15.649302 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:36:15.649314 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:36:15.649323 kernel: kauditd_printk_skb: 39 callbacks suppressed Oct 2 20:36:15.649332 kernel: audit: type=1334 audit(1696278974.929:87): prog-id=12 op=LOAD Oct 2 20:36:15.649340 kernel: audit: type=1334 audit(1696278974.929:88): prog-id=3 op=UNLOAD Oct 2 20:36:15.649349 kernel: audit: type=1334 audit(1696278974.929:89): prog-id=13 op=LOAD Oct 2 20:36:15.649357 kernel: audit: type=1334 audit(1696278974.929:90): prog-id=14 op=LOAD Oct 2 20:36:15.649366 kernel: audit: type=1334 audit(1696278974.929:91): prog-id=4 op=UNLOAD Oct 2 20:36:15.649376 kernel: audit: type=1334 audit(1696278974.929:92): prog-id=5 op=UNLOAD Oct 2 20:36:15.649385 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:36:15.649394 kernel: audit: type=1334 audit(1696278974.935:93): prog-id=15 op=LOAD Oct 2 20:36:15.649403 systemd[1]: Stopped iscsiuio.service. Oct 2 20:36:15.649412 kernel: audit: type=1334 audit(1696278974.935:94): prog-id=12 op=UNLOAD Oct 2 20:36:15.649420 kernel: audit: type=1334 audit(1696278974.941:95): prog-id=16 op=LOAD Oct 2 20:36:15.649428 kernel: audit: type=1334 audit(1696278974.947:96): prog-id=17 op=LOAD Oct 2 20:36:15.649438 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:36:15.649447 systemd[1]: Stopped iscsid.service. Oct 2 20:36:15.649456 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:36:15.649466 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:36:15.649477 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:36:15.649487 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:36:15.649496 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:36:15.649505 systemd[1]: Created slice system-getty.slice. Oct 2 20:36:15.649514 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:36:15.649525 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:36:15.649534 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:36:15.649544 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:36:15.649553 systemd[1]: Created slice user.slice. Oct 2 20:36:15.649563 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:36:15.649572 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:36:15.649581 systemd[1]: Set up automount boot.automount. Oct 2 20:36:15.649590 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:36:15.649600 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:36:15.649610 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:36:15.649620 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:36:15.649629 systemd[1]: Reached target integritysetup.target. Oct 2 20:36:15.649638 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:36:15.649647 systemd[1]: Reached target remote-fs.target. Oct 2 20:36:15.649656 systemd[1]: Reached target slices.target. Oct 2 20:36:15.649666 systemd[1]: Reached target swap.target. Oct 2 20:36:15.649685 systemd[1]: Reached target torcx.target. Oct 2 20:36:15.649697 systemd[1]: Reached target veritysetup.target. Oct 2 20:36:15.649707 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:36:15.649716 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:36:15.649725 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:36:15.649736 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:36:15.649745 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:36:15.649755 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:36:15.649764 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:36:15.649774 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:36:15.649783 systemd[1]: Mounting media.mount... Oct 2 20:36:15.649792 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:36:15.649801 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:36:15.649811 systemd[1]: Mounting tmp.mount... Oct 2 20:36:15.649820 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:36:15.649831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:36:15.649840 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:36:15.649850 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:36:15.649859 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:36:15.649868 systemd[1]: Starting modprobe@drm.service... Oct 2 20:36:15.649878 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:36:15.649887 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:36:15.649897 systemd[1]: Starting modprobe@loop.service... Oct 2 20:36:15.649908 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:36:15.649917 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:36:15.649927 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:36:15.649936 kernel: fuse: init (API version 7.34) Oct 2 20:36:15.649945 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:36:15.649955 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:36:15.649964 kernel: loop: module loaded Oct 2 20:36:15.649973 systemd[1]: Stopped systemd-journald.service. Oct 2 20:36:15.649982 systemd[1]: systemd-journald.service: Consumed 2.958s CPU time. Oct 2 20:36:15.649992 systemd[1]: Starting systemd-journald.service... Oct 2 20:36:15.650002 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:36:15.650011 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:36:15.650021 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:36:15.650030 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:36:15.650039 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:36:15.650048 systemd[1]: Stopped verity-setup.service. Oct 2 20:36:15.650057 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:36:15.650067 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:36:15.650078 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:36:15.650090 systemd-journald[1181]: Journal started Oct 2 20:36:15.650124 systemd-journald[1181]: Runtime Journal (/run/log/journal/f5db8e25ef1143fba7171c198caac3af) is 8.0M, max 78.6M, 70.6M free. Oct 2 20:36:07.349000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:36:08.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:08.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:36:08.009000 audit: BPF prog-id=10 op=LOAD Oct 2 20:36:08.009000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:36:08.009000 audit: BPF prog-id=11 op=LOAD Oct 2 20:36:08.009000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:36:14.929000 audit: BPF prog-id=12 op=LOAD Oct 2 20:36:14.929000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:36:14.929000 audit: BPF prog-id=13 op=LOAD Oct 2 20:36:14.929000 audit: BPF prog-id=14 op=LOAD Oct 2 20:36:14.929000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:36:14.929000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:36:14.935000 audit: BPF prog-id=15 op=LOAD Oct 2 20:36:14.935000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:36:14.941000 audit: BPF prog-id=16 op=LOAD Oct 2 20:36:14.947000 audit: BPF prog-id=17 op=LOAD Oct 2 20:36:14.947000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:36:14.947000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:36:14.953000 audit: BPF prog-id=18 op=LOAD Oct 2 20:36:14.953000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:36:14.959000 audit: BPF prog-id=19 op=LOAD Oct 2 20:36:14.964000 audit: BPF prog-id=20 op=LOAD Oct 2 20:36:14.964000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:36:14.964000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:36:14.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:14.986000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:36:15.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.539000 audit: BPF prog-id=21 op=LOAD Oct 2 20:36:15.539000 audit: BPF prog-id=22 op=LOAD Oct 2 20:36:15.539000 audit: BPF prog-id=23 op=LOAD Oct 2 20:36:15.539000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:36:15.539000 audit: BPF prog-id=20 op=UNLOAD Oct 2 20:36:15.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.642000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:36:15.642000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffec22e920 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:15.642000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:36:15.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:09.015618 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:36:14.928745 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:36:09.058946 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:14.966584 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:36:09.058966 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:14.966981 systemd[1]: systemd-journald.service: Consumed 2.958s CPU time. Oct 2 20:36:09.059003 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:36:09.059014 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:36:09.059049 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:36:09.059061 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:36:09.059255 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:36:09.059283 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:36:09.059295 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:36:09.059663 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:36:09.059715 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:36:09.059733 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:36:09.059747 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:36:09.059764 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:36:09.059777 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:36:14.029421 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.029694 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.029802 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.029953 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:36:14.030002 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:36:14.030055 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2023-10-02T20:36:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:36:15.661618 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:36:15.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.666777 systemd[1]: Started systemd-journald.service. Oct 2 20:36:15.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.673194 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:36:15.673330 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:36:15.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.677907 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:36:15.678026 systemd[1]: Finished modprobe@drm.service. Oct 2 20:36:15.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.682431 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:36:15.682547 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:36:15.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.687360 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:36:15.687474 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:36:15.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.692191 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:36:15.692304 systemd[1]: Finished modprobe@loop.service. Oct 2 20:36:15.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.711053 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:36:15.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.719536 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:36:15.724040 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:36:15.728160 systemd[1]: Mounted media.mount. Oct 2 20:36:15.732156 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:36:15.736472 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:36:15.740943 systemd[1]: Mounted tmp.mount. Oct 2 20:36:15.744536 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:36:15.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.749980 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:36:15.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.754930 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:36:15.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.760120 systemd[1]: Reached target network-pre.target. Oct 2 20:36:15.766222 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:36:15.771694 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:36:15.775616 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:36:15.805702 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:36:15.811064 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:36:15.815309 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:36:15.816328 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:36:15.820566 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:36:15.821895 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:36:15.827779 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:36:15.833438 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:36:15.840100 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:36:15.845567 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:36:15.856519 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 20:36:15.877729 systemd-journald[1181]: Time spent on flushing to /var/log/journal/f5db8e25ef1143fba7171c198caac3af is 15.442ms for 1106 entries. Oct 2 20:36:15.877729 systemd-journald[1181]: System Journal (/var/log/journal/f5db8e25ef1143fba7171c198caac3af) is 8.0M, max 2.6G, 2.6G free. Oct 2 20:36:15.939330 systemd-journald[1181]: Received client request to flush runtime journal. Oct 2 20:36:15.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:15.888625 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:36:15.893669 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:36:15.933269 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:36:15.940960 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:36:15.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.432081 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:36:16.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:16.438469 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:36:17.699919 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:36:17.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.103565 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:36:18.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.108000 audit: BPF prog-id=24 op=LOAD Oct 2 20:36:18.108000 audit: BPF prog-id=25 op=LOAD Oct 2 20:36:18.108000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:36:18.108000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:36:18.110144 systemd[1]: Starting systemd-udevd.service... Oct 2 20:36:18.129888 systemd-udevd[1200]: Using default interface naming scheme 'v252'. Oct 2 20:36:18.405906 systemd[1]: Started systemd-udevd.service. Oct 2 20:36:18.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.416000 audit: BPF prog-id=26 op=LOAD Oct 2 20:36:18.417830 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:18.458105 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 20:36:18.518701 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:36:18.527000 audit[1201]: AVC avc: denied { confidentiality } for pid=1201 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:36:18.543000 audit: BPF prog-id=27 op=LOAD Oct 2 20:36:18.543000 audit: BPF prog-id=28 op=LOAD Oct 2 20:36:18.543000 audit: BPF prog-id=29 op=LOAD Oct 2 20:36:18.544426 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:36:18.571823 kernel: hv_vmbus: registering driver hv_balloon Oct 2 20:36:18.571901 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 20:36:18.571917 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 20:36:18.571930 kernel: hv_vmbus: registering driver hv_utils Oct 2 20:36:18.576412 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 20:36:18.584568 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 20:36:18.584622 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 20:36:18.493564 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 20:36:18.615328 systemd-journald[1181]: Time jumped backwards, rotating. Oct 2 20:36:18.615409 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 20:36:18.615422 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 20:36:18.615438 kernel: hv_balloon: Memory hot add disabled on ARM64 Oct 2 20:36:18.615450 kernel: Console: switching to colour dummy device 80x25 Oct 2 20:36:18.615462 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:36:18.527000 audit[1201]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaeb529e50 a1=aa2c a2=ffff827624b0 a3=aaaaeb48b010 items=10 ppid=1200 pid=1201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:18.527000 audit: CWD cwd="/" Oct 2 20:36:18.527000 audit: PATH item=0 name=(null) inode=10556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=1 name=(null) inode=10557 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=2 name=(null) inode=10556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=3 name=(null) inode=10558 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=4 name=(null) inode=10556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=5 name=(null) inode=10559 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=6 name=(null) inode=10556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=7 name=(null) inode=10560 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=8 name=(null) inode=10556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PATH item=9 name=(null) inode=10561 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:36:18.527000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:36:18.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.533022 systemd[1]: Started systemd-userdbd.service. Oct 2 20:36:18.776572 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1212) Oct 2 20:36:18.805184 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:36:18.811196 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:36:18.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.818329 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:36:18.834016 systemd-networkd[1221]: lo: Link UP Oct 2 20:36:18.834028 systemd-networkd[1221]: lo: Gained carrier Oct 2 20:36:18.834409 systemd-networkd[1221]: Enumeration completed Oct 2 20:36:18.834597 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:18.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:18.841278 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:18.862641 systemd-networkd[1221]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:18.916607 kernel: mlx5_core 6820:00:02.0 enP26656s1: Link up Oct 2 20:36:18.959551 kernel: hv_netvsc 002248b6-c41d-0022-48b6-c41d002248b6 eth0: Data path switched to VF: enP26656s1 Oct 2 20:36:18.959617 systemd-networkd[1221]: enP26656s1: Link UP Oct 2 20:36:18.959703 systemd-networkd[1221]: eth0: Link UP Oct 2 20:36:18.959706 systemd-networkd[1221]: eth0: Gained carrier Oct 2 20:36:18.966858 systemd-networkd[1221]: enP26656s1: Gained carrier Oct 2 20:36:18.977652 systemd-networkd[1221]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:19.150674 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.189615 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:36:19.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.194720 systemd[1]: Reached target cryptsetup.target. Oct 2 20:36:19.200610 systemd[1]: Starting lvm2-activation.service... Oct 2 20:36:19.207069 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:36:19.231628 systemd[1]: Finished lvm2-activation.service. Oct 2 20:36:19.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.236631 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:36:19.241348 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:36:19.241374 systemd[1]: Reached target local-fs.target. Oct 2 20:36:19.245727 systemd[1]: Reached target machines.target. Oct 2 20:36:19.251279 systemd[1]: Starting ldconfig.service... Oct 2 20:36:19.255096 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.255159 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:19.256205 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:36:19.261429 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:36:19.269090 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:36:19.273841 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.273901 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:36:19.274878 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:36:19.310736 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:36:19.485902 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:36:19.579724 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:36:19.585129 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:36:19.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.591282 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1282 (bootctl) Oct 2 20:36:19.592486 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:36:19.914406 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:36:19.915896 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:36:19.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:19.925122 kernel: kauditd_printk_skb: 81 callbacks suppressed Oct 2 20:36:19.925195 kernel: audit: type=1130 audit(1696278979.920:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.023943 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) Oct 2 20:36:20.023943 systemd-fsck[1290]: /dev/sda1: 236 files, 113463/258078 clusters Oct 2 20:36:20.026830 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:36:20.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.035178 systemd[1]: Mounting boot.mount... Oct 2 20:36:20.061562 kernel: audit: type=1130 audit(1696278980.033:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.060732 systemd[1]: Mounted boot.mount. Oct 2 20:36:20.071436 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:36:20.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.094556 kernel: audit: type=1130 audit(1696278980.074:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.352676 systemd-networkd[1221]: eth0: Gained IPv6LL Oct 2 20:36:20.358788 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:20.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:20.382550 kernel: audit: type=1130 audit(1696278980.362:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.453698 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:36:21.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.460837 systemd[1]: Starting audit-rules.service... Oct 2 20:36:21.479306 kernel: audit: type=1130 audit(1696278981.458:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.480982 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:36:21.487157 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:36:21.498000 audit: BPF prog-id=30 op=LOAD Oct 2 20:36:21.505604 kernel: audit: type=1334 audit(1696278981.498:168): prog-id=30 op=LOAD Oct 2 20:36:21.501208 systemd[1]: Starting systemd-resolved.service... Oct 2 20:36:21.509000 audit: BPF prog-id=31 op=LOAD Oct 2 20:36:21.511821 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:36:21.516604 kernel: audit: type=1334 audit(1696278981.509:169): prog-id=31 op=LOAD Oct 2 20:36:21.522840 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:36:21.527656 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:36:21.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.535480 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:36:21.550578 kernel: audit: type=1130 audit(1696278981.531:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.635992 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:36:21.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.641061 systemd[1]: Reached target time-set.target. Oct 2 20:36:21.639000 audit[1307]: SYSTEM_BOOT pid=1307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.681338 kernel: audit: type=1130 audit(1696278981.639:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.681428 kernel: audit: type=1127 audit(1696278981.639:172): pid=1307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.683426 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:36:21.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.701886 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:36:21.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.785580 systemd-resolved[1300]: Positive Trust Anchors: Oct 2 20:36:21.785601 systemd-resolved[1300]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:36:21.785633 systemd-resolved[1300]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:36:21.846326 systemd-resolved[1300]: Using system hostname 'ci-3510.3.0-a-96ab8c487b'. Oct 2 20:36:21.848095 systemd[1]: Started systemd-resolved.service. Oct 2 20:36:21.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:36:21.853059 systemd[1]: Reached target network.target. Oct 2 20:36:21.857658 systemd[1]: Reached target network-online.target. Oct 2 20:36:21.862477 systemd[1]: Reached target nss-lookup.target. Oct 2 20:36:21.928000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:36:21.928000 audit[1317]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffced69020 a2=420 a3=0 items=0 ppid=1296 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:36:21.928000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:36:21.944468 augenrules[1317]: No rules Oct 2 20:36:21.945246 systemd[1]: Finished audit-rules.service. Oct 2 20:36:21.964694 systemd-timesyncd[1304]: Contacted time server 45.33.53.84:123 (0.flatcar.pool.ntp.org). Oct 2 20:36:21.965020 systemd-timesyncd[1304]: Initial clock synchronization to Mon 2023-10-02 20:36:21.968146 UTC. Oct 2 20:36:27.214294 ldconfig[1281]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:36:27.224447 systemd[1]: Finished ldconfig.service. Oct 2 20:36:27.231246 systemd[1]: Starting systemd-update-done.service... Oct 2 20:36:27.255117 systemd[1]: Finished systemd-update-done.service. Oct 2 20:36:27.260245 systemd[1]: Reached target sysinit.target. Oct 2 20:36:27.264785 systemd[1]: Started motdgen.path. Oct 2 20:36:27.268653 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:36:27.276079 systemd[1]: Started logrotate.timer. Oct 2 20:36:27.280432 systemd[1]: Started mdadm.timer. Oct 2 20:36:27.284275 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:36:27.289735 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:36:27.289768 systemd[1]: Reached target paths.target. Oct 2 20:36:27.294223 systemd[1]: Reached target timers.target. Oct 2 20:36:27.299097 systemd[1]: Listening on dbus.socket. Oct 2 20:36:27.304246 systemd[1]: Starting docker.socket... Oct 2 20:36:27.310813 systemd[1]: Listening on sshd.socket. Oct 2 20:36:27.315132 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.315648 systemd[1]: Listening on docker.socket. Oct 2 20:36:27.320504 systemd[1]: Reached target sockets.target. Oct 2 20:36:27.325037 systemd[1]: Reached target basic.target. Oct 2 20:36:27.329327 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.329351 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:36:27.330667 systemd[1]: Starting containerd.service... Oct 2 20:36:27.335722 systemd[1]: Starting dbus.service... Oct 2 20:36:27.340590 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:36:27.347434 systemd[1]: Starting extend-filesystems.service... Oct 2 20:36:27.353374 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:36:27.354681 systemd[1]: Starting motdgen.service... Oct 2 20:36:27.360354 systemd[1]: Started nvidia.service. Oct 2 20:36:27.366363 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:36:27.375691 systemd[1]: Starting prepare-critools.service... Oct 2 20:36:27.383696 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:36:27.392486 systemd[1]: Starting sshd-keygen.service... Oct 2 20:36:27.400078 systemd[1]: Starting systemd-logind.service... Oct 2 20:36:27.407806 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:36:27.407869 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 20:36:27.408297 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:36:27.410005 systemd[1]: Starting update-engine.service... Oct 2 20:36:27.418019 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:36:27.427595 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:36:27.427761 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:36:27.440211 jq[1327]: false Oct 2 20:36:27.441644 jq[1346]: true Oct 2 20:36:27.457472 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:36:27.457668 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:36:27.472118 extend-filesystems[1328]: Found sda Oct 2 20:36:27.482810 extend-filesystems[1328]: Found sda1 Oct 2 20:36:27.482810 extend-filesystems[1328]: Found sda2 Oct 2 20:36:27.482810 extend-filesystems[1328]: Found sda3 Oct 2 20:36:27.482810 extend-filesystems[1328]: Found usr Oct 2 20:36:27.482810 extend-filesystems[1328]: Found sda4 Oct 2 20:36:27.482810 extend-filesystems[1328]: Found sda6 Oct 2 20:36:27.476804 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:36:27.508308 jq[1350]: true Oct 2 20:36:27.508417 extend-filesystems[1328]: Found sda7 Oct 2 20:36:27.508417 extend-filesystems[1328]: Found sda9 Oct 2 20:36:27.508417 extend-filesystems[1328]: Checking size of /dev/sda9 Oct 2 20:36:27.476973 systemd[1]: Finished motdgen.service. Oct 2 20:36:27.521757 systemd-logind[1339]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 20:36:27.527998 systemd-logind[1339]: New seat seat0. Oct 2 20:36:27.581127 extend-filesystems[1328]: Old size kept for /dev/sda9 Oct 2 20:36:27.588821 extend-filesystems[1328]: Found sr0 Oct 2 20:36:27.599994 env[1352]: time="2023-10-02T20:36:27.596889321Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:36:27.588926 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:36:27.589102 systemd[1]: Finished extend-filesystems.service. Oct 2 20:36:27.644898 env[1352]: time="2023-10-02T20:36:27.644853589Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:36:27.645160 env[1352]: time="2023-10-02T20:36:27.645142315Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649578556Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649613361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649824996Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649840878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649856361Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649866522Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.649934333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.650228941Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.650338999Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:36:27.650456 env[1352]: time="2023-10-02T20:36:27.650357322Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:36:27.650728 env[1352]: time="2023-10-02T20:36:27.650406450Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:36:27.650728 env[1352]: time="2023-10-02T20:36:27.650418372Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:36:27.671435 bash[1388]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:36:27.672407 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679311703Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679380874Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679395396Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679578946Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679619073Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679672521Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.679690324Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680099231Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680118554Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680131396Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680144278Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680156960Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680306504Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:36:27.681126 env[1352]: time="2023-10-02T20:36:27.680392078Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680763259Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680802225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680815907Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680894520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680909322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.681498 env[1352]: time="2023-10-02T20:36:27.680926965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.680938567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681567229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681584472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681597074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681609436Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681639161Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681801027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681817470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682010 env[1352]: time="2023-10-02T20:36:27.681830392Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682435 env[1352]: time="2023-10-02T20:36:27.681843914Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:36:27.682435 env[1352]: time="2023-10-02T20:36:27.682210333Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:36:27.682435 env[1352]: time="2023-10-02T20:36:27.682228056Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:36:27.682435 env[1352]: time="2023-10-02T20:36:27.682245539Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:36:27.682435 env[1352]: time="2023-10-02T20:36:27.682293867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:36:27.682803 env[1352]: time="2023-10-02T20:36:27.682723577Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.683171450Z" level=info msg="Connect containerd service" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.683231979Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.683906169Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684045631Z" level=info msg="Start subscribing containerd event" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684104721Z" level=info msg="Start recovering state" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684163891Z" level=info msg="Start event monitor" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684245024Z" level=info msg="Start snapshots syncer" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684255586Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684263267Z" level=info msg="Start streaming server" Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.684698617Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.687309161Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:36:27.698745 env[1352]: time="2023-10-02T20:36:27.694809139Z" level=info msg="containerd successfully booted in 0.117484s" Oct 2 20:36:27.694902 systemd[1]: Started containerd.service. Oct 2 20:36:27.730317 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 20:36:27.748599 tar[1348]: ./ Oct 2 20:36:27.748599 tar[1348]: ./loopback Oct 2 20:36:27.751928 tar[1349]: crictl Oct 2 20:36:27.768716 dbus-daemon[1326]: [system] SELinux support is enabled Oct 2 20:36:27.768857 systemd[1]: Started dbus.service. Oct 2 20:36:27.774720 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:36:27.774754 systemd[1]: Reached target system-config.target. Oct 2 20:36:27.783208 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:36:27.783231 systemd[1]: Reached target user-config.target. Oct 2 20:36:27.792123 systemd[1]: Started systemd-logind.service. Oct 2 20:36:27.792324 dbus-daemon[1326]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 20:36:27.815056 tar[1348]: ./bandwidth Oct 2 20:36:27.883197 tar[1348]: ./ptp Oct 2 20:36:27.949499 tar[1348]: ./vlan Oct 2 20:36:28.016379 tar[1348]: ./host-device Oct 2 20:36:28.082841 tar[1348]: ./tuning Oct 2 20:36:28.141097 tar[1348]: ./vrf Oct 2 20:36:28.163197 systemd[1]: Finished prepare-critools.service. Oct 2 20:36:28.188011 tar[1348]: ./sbr Oct 2 20:36:28.189484 update_engine[1342]: I1002 20:36:28.175688 1342 main.cc:92] Flatcar Update Engine starting Oct 2 20:36:28.218400 tar[1348]: ./tap Oct 2 20:36:28.241471 systemd[1]: Started update-engine.service. Oct 2 20:36:28.241943 update_engine[1342]: I1002 20:36:28.241813 1342 update_check_scheduler.cc:74] Next update check in 3m1s Oct 2 20:36:28.248948 systemd[1]: Started locksmithd.service. Oct 2 20:36:28.257870 tar[1348]: ./dhcp Oct 2 20:36:28.339906 tar[1348]: ./static Oct 2 20:36:28.364125 tar[1348]: ./firewall Oct 2 20:36:28.400431 tar[1348]: ./macvlan Oct 2 20:36:28.433711 tar[1348]: ./dummy Oct 2 20:36:28.466484 tar[1348]: ./bridge Oct 2 20:36:28.502120 tar[1348]: ./ipvlan Oct 2 20:36:28.534634 tar[1348]: ./portmap Oct 2 20:36:28.565746 tar[1348]: ./host-local Oct 2 20:36:28.635431 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:36:29.705715 locksmithd[1429]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:36:30.212340 sshd_keygen[1344]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:36:30.237518 systemd[1]: Finished sshd-keygen.service. Oct 2 20:36:30.243699 systemd[1]: Starting issuegen.service... Oct 2 20:36:30.248272 systemd[1]: Started waagent.service. Oct 2 20:36:30.254017 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:36:30.254162 systemd[1]: Finished issuegen.service. Oct 2 20:36:30.260018 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:36:30.286568 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:36:30.293700 systemd[1]: Started getty@tty1.service. Oct 2 20:36:30.299701 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 20:36:30.304644 systemd[1]: Reached target getty.target. Oct 2 20:36:30.308822 systemd[1]: Reached target multi-user.target. Oct 2 20:36:30.319207 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:36:30.329805 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:36:30.329950 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:36:30.336883 systemd[1]: Startup finished in 743ms (kernel) + 18.234s (initrd) + 23.549s (userspace) = 42.527s. Oct 2 20:36:30.843029 login[1450]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 20:36:30.843641 login[1449]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:30.886648 systemd[1]: Created slice user-500.slice. Oct 2 20:36:30.888645 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:36:30.891040 systemd-logind[1339]: New session 1 of user core. Oct 2 20:36:30.929504 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:36:30.930819 systemd[1]: Starting user@500.service... Oct 2 20:36:30.963586 (systemd)[1453]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:36:31.195107 systemd[1453]: Queued start job for default target default.target. Oct 2 20:36:31.195678 systemd[1453]: Reached target paths.target. Oct 2 20:36:31.195697 systemd[1453]: Reached target sockets.target. Oct 2 20:36:31.195708 systemd[1453]: Reached target timers.target. Oct 2 20:36:31.195718 systemd[1453]: Reached target basic.target. Oct 2 20:36:31.195819 systemd[1]: Started user@500.service. Oct 2 20:36:31.196514 systemd[1453]: Reached target default.target. Oct 2 20:36:31.196585 systemd[1453]: Startup finished in 223ms. Oct 2 20:36:31.196682 systemd[1]: Started session-1.scope. Oct 2 20:36:31.844430 login[1450]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:36:31.848749 systemd[1]: Started session-2.scope. Oct 2 20:36:31.849085 systemd-logind[1339]: New session 2 of user core. Oct 2 20:36:36.431640 waagent[1444]: 2023-10-02T20:36:36.431512Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 20:36:36.439075 waagent[1444]: 2023-10-02T20:36:36.438994Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 20:36:36.444081 waagent[1444]: 2023-10-02T20:36:36.444016Z INFO Daemon Daemon Python: 3.9.16 Oct 2 20:36:36.448891 waagent[1444]: 2023-10-02T20:36:36.448811Z INFO Daemon Daemon Run daemon Oct 2 20:36:36.453196 waagent[1444]: 2023-10-02T20:36:36.453141Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 20:36:36.475054 waagent[1444]: 2023-10-02T20:36:36.474925Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:36.491466 waagent[1444]: 2023-10-02T20:36:36.491337Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:36.501652 waagent[1444]: 2023-10-02T20:36:36.501573Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:36.506849 waagent[1444]: 2023-10-02T20:36:36.506780Z INFO Daemon Daemon Using waagent for provisioning Oct 2 20:36:36.512847 waagent[1444]: 2023-10-02T20:36:36.512784Z INFO Daemon Daemon Activate resource disk Oct 2 20:36:36.518013 waagent[1444]: 2023-10-02T20:36:36.517953Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 20:36:36.532707 waagent[1444]: 2023-10-02T20:36:36.532631Z INFO Daemon Daemon Found device: None Oct 2 20:36:36.537815 waagent[1444]: 2023-10-02T20:36:36.537752Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 20:36:36.547220 waagent[1444]: 2023-10-02T20:36:36.547157Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 20:36:36.559553 waagent[1444]: 2023-10-02T20:36:36.559475Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:36.565650 waagent[1444]: 2023-10-02T20:36:36.565591Z INFO Daemon Daemon Running default provisioning handler Oct 2 20:36:36.582679 waagent[1444]: 2023-10-02T20:36:36.582562Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 20:36:36.598073 waagent[1444]: 2023-10-02T20:36:36.597950Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 20:36:36.608286 waagent[1444]: 2023-10-02T20:36:36.608201Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 20:36:36.613653 waagent[1444]: 2023-10-02T20:36:36.613583Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 20:36:36.737429 waagent[1444]: 2023-10-02T20:36:36.737240Z INFO Daemon Daemon Successfully mounted dvd Oct 2 20:36:36.850822 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 20:36:36.889448 waagent[1444]: 2023-10-02T20:36:36.889301Z INFO Daemon Daemon Detect protocol endpoint Oct 2 20:36:36.894658 waagent[1444]: 2023-10-02T20:36:36.894585Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 20:36:36.900844 waagent[1444]: 2023-10-02T20:36:36.900776Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 20:36:36.907638 waagent[1444]: 2023-10-02T20:36:36.907579Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 20:36:36.913120 waagent[1444]: 2023-10-02T20:36:36.913064Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 20:36:36.918220 waagent[1444]: 2023-10-02T20:36:36.918166Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 20:36:37.065481 waagent[1444]: 2023-10-02T20:36:37.065366Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 20:36:37.073485 waagent[1444]: 2023-10-02T20:36:37.073439Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 20:36:37.079137 waagent[1444]: 2023-10-02T20:36:37.079078Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 20:36:37.766283 waagent[1444]: 2023-10-02T20:36:37.766141Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 20:36:37.782042 waagent[1444]: 2023-10-02T20:36:37.781971Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 20:36:37.787880 waagent[1444]: 2023-10-02T20:36:37.787822Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 20:36:37.881234 waagent[1444]: 2023-10-02T20:36:37.881093Z INFO Daemon Daemon Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:37.890206 waagent[1444]: 2023-10-02T20:36:37.890123Z INFO Daemon Daemon Certificate with thumbprint 13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA has no matching private key. Oct 2 20:36:37.899975 waagent[1444]: 2023-10-02T20:36:37.899901Z INFO Daemon Daemon Fetch goal state completed Oct 2 20:36:37.948852 waagent[1444]: 2023-10-02T20:36:37.948796Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: a67db815-e04f-40a3-8c5b-6e17ef6b2d5b New eTag: 3524730652584384652] Oct 2 20:36:37.960729 waagent[1444]: 2023-10-02T20:36:37.960644Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:37.977241 waagent[1444]: 2023-10-02T20:36:37.977175Z INFO Daemon Daemon Starting provisioning Oct 2 20:36:37.982341 waagent[1444]: 2023-10-02T20:36:37.982265Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 20:36:37.988159 waagent[1444]: 2023-10-02T20:36:37.988089Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-96ab8c487b] Oct 2 20:36:38.059012 waagent[1444]: 2023-10-02T20:36:38.058893Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-96ab8c487b] Oct 2 20:36:38.066011 waagent[1444]: 2023-10-02T20:36:38.065935Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 20:36:38.072636 waagent[1444]: 2023-10-02T20:36:38.072571Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 20:36:38.092099 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 20:36:38.092256 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 20:36:38.092310 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 20:36:38.092573 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:36:38.095574 systemd-networkd[1221]: eth0: DHCPv6 lease lost Oct 2 20:36:38.097138 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:36:38.097306 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:36:38.099179 systemd[1]: Starting systemd-networkd.service... Oct 2 20:36:38.131209 systemd-networkd[1500]: enP26656s1: Link UP Oct 2 20:36:38.131451 systemd-networkd[1500]: enP26656s1: Gained carrier Oct 2 20:36:38.132385 systemd-networkd[1500]: eth0: Link UP Oct 2 20:36:38.132465 systemd-networkd[1500]: eth0: Gained carrier Oct 2 20:36:38.132887 systemd-networkd[1500]: lo: Link UP Oct 2 20:36:38.132960 systemd-networkd[1500]: lo: Gained carrier Oct 2 20:36:38.133248 systemd-networkd[1500]: eth0: Gained IPv6LL Oct 2 20:36:38.134350 systemd-networkd[1500]: Enumeration completed Oct 2 20:36:38.134538 systemd[1]: Started systemd-networkd.service. Oct 2 20:36:38.136112 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:36:38.142731 waagent[1444]: 2023-10-02T20:36:38.136934Z INFO Daemon Daemon Create user account if not exists Oct 2 20:36:38.143323 waagent[1444]: 2023-10-02T20:36:38.143255Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 20:36:38.149742 systemd-networkd[1500]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:36:38.150295 waagent[1444]: 2023-10-02T20:36:38.150207Z INFO Daemon Daemon Configure sudoer Oct 2 20:36:38.155417 waagent[1444]: 2023-10-02T20:36:38.155346Z INFO Daemon Daemon Configure sshd Oct 2 20:36:38.159894 waagent[1444]: 2023-10-02T20:36:38.159823Z INFO Daemon Daemon Deploy ssh public key. Oct 2 20:36:38.168601 systemd-networkd[1500]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Oct 2 20:36:38.171553 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:36:39.426921 waagent[1444]: 2023-10-02T20:36:39.426837Z INFO Daemon Daemon Provisioning complete Oct 2 20:36:39.450175 waagent[1444]: 2023-10-02T20:36:39.450111Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 20:36:39.457195 waagent[1444]: 2023-10-02T20:36:39.457124Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 20:36:39.468584 waagent[1444]: 2023-10-02T20:36:39.468496Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 20:36:39.768225 waagent[1509]: 2023-10-02T20:36:39.768089Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 20:36:39.769277 waagent[1509]: 2023-10-02T20:36:39.769223Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:39.769498 waagent[1509]: 2023-10-02T20:36:39.769451Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:39.782055 waagent[1509]: 2023-10-02T20:36:39.781986Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 20:36:39.782350 waagent[1509]: 2023-10-02T20:36:39.782302Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 20:36:39.860604 waagent[1509]: 2023-10-02T20:36:39.860454Z INFO ExtHandler ExtHandler Found private key matching thumbprint 96E73459C46BA3662DD73E07899B2530C5F3E5EB Oct 2 20:36:39.860963 waagent[1509]: 2023-10-02T20:36:39.860910Z INFO ExtHandler ExtHandler Certificate with thumbprint 13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA has no matching private key. Oct 2 20:36:39.861278 waagent[1509]: 2023-10-02T20:36:39.861231Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 20:36:39.874301 waagent[1509]: 2023-10-02T20:36:39.874250Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b697649c-7445-4814-941f-f2e85cbbe64c New eTag: 3524730652584384652] Oct 2 20:36:39.874999 waagent[1509]: 2023-10-02T20:36:39.874943Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 20:36:39.975273 waagent[1509]: 2023-10-02T20:36:39.975145Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:40.000745 waagent[1509]: 2023-10-02T20:36:40.000670Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1509 Oct 2 20:36:40.004580 waagent[1509]: 2023-10-02T20:36:40.004504Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:40.006039 waagent[1509]: 2023-10-02T20:36:40.005984Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:40.143963 waagent[1509]: 2023-10-02T20:36:40.143904Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:40.144503 waagent[1509]: 2023-10-02T20:36:40.144448Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:40.154839 waagent[1509]: 2023-10-02T20:36:40.154793Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:40.155397 waagent[1509]: 2023-10-02T20:36:40.155345Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:40.156635 waagent[1509]: 2023-10-02T20:36:40.156576Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 20:36:40.158003 waagent[1509]: 2023-10-02T20:36:40.157938Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:40.158275 waagent[1509]: 2023-10-02T20:36:40.158210Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:40.158836 waagent[1509]: 2023-10-02T20:36:40.158767Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:40.159399 waagent[1509]: 2023-10-02T20:36:40.159336Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:40.159996 waagent[1509]: 2023-10-02T20:36:40.159934Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:40.160265 waagent[1509]: 2023-10-02T20:36:40.160201Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:40.160265 waagent[1509]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:40.160265 waagent[1509]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:40.160265 waagent[1509]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:40.160265 waagent[1509]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.160265 waagent[1509]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.160265 waagent[1509]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:40.162508 waagent[1509]: 2023-10-02T20:36:40.162353Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:40.162837 waagent[1509]: 2023-10-02T20:36:40.162762Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:40.163709 waagent[1509]: 2023-10-02T20:36:40.163623Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:40.163920 waagent[1509]: 2023-10-02T20:36:40.163851Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:40.164190 waagent[1509]: 2023-10-02T20:36:40.164118Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:40.164361 waagent[1509]: 2023-10-02T20:36:40.164296Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:40.164964 waagent[1509]: 2023-10-02T20:36:40.164902Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:40.167112 waagent[1509]: 2023-10-02T20:36:40.167040Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:40.169188 waagent[1509]: 2023-10-02T20:36:40.169113Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:40.169328 waagent[1509]: 2023-10-02T20:36:40.169277Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:40.178306 waagent[1509]: 2023-10-02T20:36:40.178241Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 20:36:40.179799 waagent[1509]: 2023-10-02T20:36:40.179748Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:40.180922 waagent[1509]: 2023-10-02T20:36:40.180863Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 20:36:40.212056 waagent[1509]: 2023-10-02T20:36:40.211918Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1500' Oct 2 20:36:40.228208 waagent[1509]: 2023-10-02T20:36:40.228139Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 20:36:40.286327 waagent[1509]: 2023-10-02T20:36:40.286198Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:40.286327 waagent[1509]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:40.286327 waagent[1509]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:40.286327 waagent[1509]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:c4:1d brd ff:ff:ff:ff:ff:ff Oct 2 20:36:40.286327 waagent[1509]: 3: enP26656s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:c4:1d brd ff:ff:ff:ff:ff:ff\ altname enP26656p0s2 Oct 2 20:36:40.286327 waagent[1509]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:40.286327 waagent[1509]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:40.286327 waagent[1509]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:40.286327 waagent[1509]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:40.286327 waagent[1509]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:40.286327 waagent[1509]: 2: eth0 inet6 fe80::222:48ff:feb6:c41d/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:40.413900 waagent[1509]: 2023-10-02T20:36:40.413796Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Oct 2 20:36:40.471889 waagent[1444]: 2023-10-02T20:36:40.471727Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 20:36:40.475427 waagent[1444]: 2023-10-02T20:36:40.475370Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Oct 2 20:36:41.598065 waagent[1538]: 2023-10-02T20:36:41.597958Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Oct 2 20:36:41.598752 waagent[1538]: 2023-10-02T20:36:41.598696Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 20:36:41.598884 waagent[1538]: 2023-10-02T20:36:41.598837Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 20:36:41.608648 waagent[1538]: 2023-10-02T20:36:41.608477Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 20:36:41.609064 waagent[1538]: 2023-10-02T20:36:41.609003Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:41.609211 waagent[1538]: 2023-10-02T20:36:41.609165Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:41.623210 waagent[1538]: 2023-10-02T20:36:41.623141Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 20:36:41.631614 waagent[1538]: 2023-10-02T20:36:41.631558Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 20:36:41.632610 waagent[1538]: 2023-10-02T20:36:41.632550Z INFO ExtHandler Oct 2 20:36:41.632753 waagent[1538]: 2023-10-02T20:36:41.632706Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6d39c37c-8fad-46b4-8fc1-4b9208723150 eTag: 3524730652584384652 source: Fabric] Oct 2 20:36:41.633462 waagent[1538]: 2023-10-02T20:36:41.633406Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 20:36:41.634690 waagent[1538]: 2023-10-02T20:36:41.634631Z INFO ExtHandler Oct 2 20:36:41.634819 waagent[1538]: 2023-10-02T20:36:41.634775Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 20:36:41.640897 waagent[1538]: 2023-10-02T20:36:41.640851Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 20:36:41.641368 waagent[1538]: 2023-10-02T20:36:41.641321Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 20:36:41.660639 waagent[1538]: 2023-10-02T20:36:41.660582Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 20:36:41.743231 waagent[1538]: 2023-10-02T20:36:41.743096Z INFO ExtHandler Downloaded certificate {'thumbprint': '96E73459C46BA3662DD73E07899B2530C5F3E5EB', 'hasPrivateKey': True} Oct 2 20:36:41.744272 waagent[1538]: 2023-10-02T20:36:41.744213Z INFO ExtHandler Downloaded certificate {'thumbprint': '13D6851ACC9A1DF6D981F03BE39B2DF5CA46BDCA', 'hasPrivateKey': False} Oct 2 20:36:41.745300 waagent[1538]: 2023-10-02T20:36:41.745239Z INFO ExtHandler Fetch goal state completed Oct 2 20:36:41.771364 waagent[1538]: 2023-10-02T20:36:41.771290Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1538 Oct 2 20:36:41.774861 waagent[1538]: 2023-10-02T20:36:41.774798Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 20:36:41.776308 waagent[1538]: 2023-10-02T20:36:41.776253Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 20:36:41.782249 waagent[1538]: 2023-10-02T20:36:41.782186Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 20:36:41.782675 waagent[1538]: 2023-10-02T20:36:41.782619Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 20:36:41.792784 waagent[1538]: 2023-10-02T20:36:41.792719Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 20:36:41.793275 waagent[1538]: 2023-10-02T20:36:41.793216Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 20:36:41.800561 waagent[1538]: 2023-10-02T20:36:41.800434Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 20:36:41.804142 waagent[1538]: 2023-10-02T20:36:41.804080Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 20:36:41.805843 waagent[1538]: 2023-10-02T20:36:41.805769Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 20:36:41.806466 waagent[1538]: 2023-10-02T20:36:41.806408Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:41.806770 waagent[1538]: 2023-10-02T20:36:41.806717Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:41.807420 waagent[1538]: 2023-10-02T20:36:41.807363Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 20:36:41.807811 waagent[1538]: 2023-10-02T20:36:41.807759Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 20:36:41.807811 waagent[1538]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 20:36:41.807811 waagent[1538]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 20:36:41.807811 waagent[1538]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 20:36:41.807811 waagent[1538]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:41.807811 waagent[1538]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:41.807811 waagent[1538]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 20:36:41.810252 waagent[1538]: 2023-10-02T20:36:41.810134Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 20:36:41.811085 waagent[1538]: 2023-10-02T20:36:41.811024Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 20:36:41.811342 waagent[1538]: 2023-10-02T20:36:41.811290Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 20:36:41.811964 waagent[1538]: 2023-10-02T20:36:41.811834Z INFO EnvHandler ExtHandler Configure routes Oct 2 20:36:41.814145 waagent[1538]: 2023-10-02T20:36:41.814006Z INFO EnvHandler ExtHandler Gateway:None Oct 2 20:36:41.814307 waagent[1538]: 2023-10-02T20:36:41.814253Z INFO EnvHandler ExtHandler Routes:None Oct 2 20:36:41.815137 waagent[1538]: 2023-10-02T20:36:41.815057Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 20:36:41.815797 waagent[1538]: 2023-10-02T20:36:41.815727Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 20:36:41.816303 waagent[1538]: 2023-10-02T20:36:41.816226Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 20:36:41.816407 waagent[1538]: 2023-10-02T20:36:41.816359Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 20:36:41.820689 waagent[1538]: 2023-10-02T20:36:41.820366Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 20:36:41.840153 waagent[1538]: 2023-10-02T20:36:41.840078Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 20:36:41.840153 waagent[1538]: Executing ['ip', '-a', '-o', 'link']: Oct 2 20:36:41.840153 waagent[1538]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 20:36:41.840153 waagent[1538]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:c4:1d brd ff:ff:ff:ff:ff:ff Oct 2 20:36:41.840153 waagent[1538]: 3: enP26656s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:c4:1d brd ff:ff:ff:ff:ff:ff\ altname enP26656p0s2 Oct 2 20:36:41.840153 waagent[1538]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 20:36:41.840153 waagent[1538]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 20:36:41.840153 waagent[1538]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 20:36:41.840153 waagent[1538]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 20:36:41.840153 waagent[1538]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 20:36:41.840153 waagent[1538]: 2: eth0 inet6 fe80::222:48ff:feb6:c41d/64 scope link \ valid_lft forever preferred_lft forever Oct 2 20:36:41.846584 waagent[1538]: 2023-10-02T20:36:41.846473Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Oct 2 20:36:41.847720 waagent[1538]: 2023-10-02T20:36:41.847652Z INFO ExtHandler ExtHandler Downloading manifest Oct 2 20:36:41.886363 waagent[1538]: 2023-10-02T20:36:41.886265Z INFO ExtHandler ExtHandler Oct 2 20:36:41.886661 waagent[1538]: 2023-10-02T20:36:41.886606Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 3be1556d-51e5-423f-9e88-219aa144542b correlation 0e4eba3f-1c72-441b-89f1-d4b38866d0df created: 2023-10-02T20:35:07.456764Z] Oct 2 20:36:41.887663 waagent[1538]: 2023-10-02T20:36:41.887606Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 20:36:41.892311 waagent[1538]: 2023-10-02T20:36:41.892189Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Oct 2 20:36:41.922296 waagent[1538]: 2023-10-02T20:36:41.922194Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 20:36:41.944379 waagent[1538]: 2023-10-02T20:36:41.944298Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 961A6C6A-A7FF-40CE-B953-BFF1161AC25A;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 20:36:42.068649 waagent[1538]: 2023-10-02T20:36:42.068503Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 20:36:42.068649 waagent[1538]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.068649 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.068649 waagent[1538]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.068649 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.068649 waagent[1538]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.068649 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.068649 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:42.068649 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:42.068649 waagent[1538]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:42.077662 waagent[1538]: 2023-10-02T20:36:42.077518Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 20:36:42.077662 waagent[1538]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.077662 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.077662 waagent[1538]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.077662 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.077662 waagent[1538]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 20:36:42.077662 waagent[1538]: pkts bytes target prot opt in out source destination Oct 2 20:36:42.077662 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 20:36:42.077662 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 20:36:42.077662 waagent[1538]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 20:36:42.078203 waagent[1538]: 2023-10-02T20:36:42.078147Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 20:37:06.672184 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Oct 2 20:37:13.824604 update_engine[1342]: I1002 20:37:13.824563 1342 update_attempter.cc:505] Updating boot flags... Oct 2 20:37:14.303936 systemd[1]: Created slice system-sshd.slice. Oct 2 20:37:14.305021 systemd[1]: Started sshd@0-10.200.20.38:22-10.200.12.6:55258.service. Oct 2 20:37:14.915425 sshd[1654]: Accepted publickey for core from 10.200.12.6 port 55258 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:14.934822 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:14.939288 systemd[1]: Started session-3.scope. Oct 2 20:37:14.939661 systemd-logind[1339]: New session 3 of user core. Oct 2 20:37:15.289049 systemd[1]: Started sshd@1-10.200.20.38:22-10.200.12.6:55264.service. Oct 2 20:37:15.741156 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 55264 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:15.742949 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:15.747000 systemd[1]: Started session-4.scope. Oct 2 20:37:15.748269 systemd-logind[1339]: New session 4 of user core. Oct 2 20:37:16.071426 sshd[1659]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:16.074400 systemd-logind[1339]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:37:16.074401 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:37:16.075349 systemd[1]: sshd@1-10.200.20.38:22-10.200.12.6:55264.service: Deactivated successfully. Oct 2 20:37:16.076094 systemd-logind[1339]: Removed session 4. Oct 2 20:37:16.140869 systemd[1]: Started sshd@2-10.200.20.38:22-10.200.12.6:55276.service. Oct 2 20:37:16.552488 sshd[1665]: Accepted publickey for core from 10.200.12.6 port 55276 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:16.554003 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:16.557833 systemd-logind[1339]: New session 5 of user core. Oct 2 20:37:16.558211 systemd[1]: Started session-5.scope. Oct 2 20:37:16.851608 sshd[1665]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:16.854176 systemd[1]: sshd@2-10.200.20.38:22-10.200.12.6:55276.service: Deactivated successfully. Oct 2 20:37:16.854852 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:37:16.855370 systemd-logind[1339]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:37:16.856211 systemd-logind[1339]: Removed session 5. Oct 2 20:37:16.921068 systemd[1]: Started sshd@3-10.200.20.38:22-10.200.12.6:55286.service. Oct 2 20:37:17.337066 sshd[1671]: Accepted publickey for core from 10.200.12.6 port 55286 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:17.337382 sshd[1671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:17.341020 systemd-logind[1339]: New session 6 of user core. Oct 2 20:37:17.341408 systemd[1]: Started session-6.scope. Oct 2 20:37:17.638839 sshd[1671]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:17.641795 systemd[1]: sshd@3-10.200.20.38:22-10.200.12.6:55286.service: Deactivated successfully. Oct 2 20:37:17.641968 systemd-logind[1339]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:37:17.642398 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:37:17.643113 systemd-logind[1339]: Removed session 6. Oct 2 20:37:17.708078 systemd[1]: Started sshd@4-10.200.20.38:22-10.200.12.6:45158.service. Oct 2 20:37:18.119962 sshd[1677]: Accepted publickey for core from 10.200.12.6 port 45158 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:18.121434 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:18.125301 systemd-logind[1339]: New session 7 of user core. Oct 2 20:37:18.125737 systemd[1]: Started session-7.scope. Oct 2 20:37:18.610596 sudo[1680]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:37:18.610792 sudo[1680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:18.652645 dbus-daemon[1326]: avc: received setenforce notice (enforcing=1) Oct 2 20:37:18.653564 sudo[1680]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:18.740887 sshd[1677]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:18.743858 systemd[1]: sshd@4-10.200.20.38:22-10.200.12.6:45158.service: Deactivated successfully. Oct 2 20:37:18.744656 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:37:18.745165 systemd-logind[1339]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:37:18.745900 systemd-logind[1339]: Removed session 7. Oct 2 20:37:18.811416 systemd[1]: Started sshd@5-10.200.20.38:22-10.200.12.6:45172.service. Oct 2 20:37:19.229571 sshd[1687]: Accepted publickey for core from 10.200.12.6 port 45172 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:19.231154 sshd[1687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:19.234976 systemd-logind[1339]: New session 8 of user core. Oct 2 20:37:19.235376 systemd[1]: Started session-8.scope. Oct 2 20:37:19.472404 sudo[1691]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:37:19.472918 sudo[1691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:19.476358 sudo[1691]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:19.482153 sudo[1690]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:37:19.482337 sudo[1690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:19.492288 systemd[1]: Stopping audit-rules.service... Oct 2 20:37:19.494000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:19.494907 auditctl[1694]: No rules Oct 2 20:37:19.495308 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:37:19.495466 systemd[1]: Stopped audit-rules.service. Oct 2 20:37:19.496780 systemd[1]: Starting audit-rules.service... Oct 2 20:37:19.499553 kernel: kauditd_printk_skb: 6 callbacks suppressed Oct 2 20:37:19.499617 kernel: audit: type=1305 audit(1696279039.494:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:37:19.494000 audit[1694]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd97e2430 a2=420 a3=0 items=0 ppid=1 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:19.531806 augenrules[1711]: No rules Oct 2 20:37:19.532191 kernel: audit: type=1300 audit(1696279039.494:177): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd97e2430 a2=420 a3=0 items=0 ppid=1 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:19.494000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:19.533148 systemd[1]: Finished audit-rules.service. Oct 2 20:37:19.535518 sudo[1690]: pam_unix(sudo:session): session closed for user root Oct 2 20:37:19.539271 kernel: audit: type=1327 audit(1696279039.494:177): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:37:19.539374 kernel: audit: type=1131 audit(1696279039.494:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.571132 kernel: audit: type=1130 audit(1696279039.532:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.571230 kernel: audit: type=1106 audit(1696279039.532:180): pid=1690 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.532000 audit[1690]: USER_END pid=1690 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.532000 audit[1690]: CRED_DISP pid=1690 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.605981 kernel: audit: type=1104 audit(1696279039.532:181): pid=1690 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.606507 sshd[1687]: pam_unix(sshd:session): session closed for user core Oct 2 20:37:19.607000 audit[1687]: USER_END pid=1687 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.607000 audit[1687]: CRED_DISP pid=1687 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.632894 systemd[1]: sshd@5-10.200.20.38:22-10.200.12.6:45172.service: Deactivated successfully. Oct 2 20:37:19.633675 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:37:19.634866 systemd-logind[1339]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:37:19.635804 systemd-logind[1339]: Removed session 8. Oct 2 20:37:19.651004 kernel: audit: type=1106 audit(1696279039.607:182): pid=1687 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.651082 kernel: audit: type=1104 audit(1696279039.607:183): pid=1687 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:19.651113 kernel: audit: type=1131 audit(1696279039.631:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:45172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:45172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:19.671953 systemd[1]: Started sshd@6-10.200.20.38:22-10.200.12.6:45186.service. Oct 2 20:37:19.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.082000 audit[1717]: USER_ACCT pid=1717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.083746 sshd[1717]: Accepted publickey for core from 10.200.12.6 port 45186 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:37:20.084000 audit[1717]: CRED_ACQ pid=1717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.084000 audit[1717]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc25d54e0 a2=3 a3=1 items=0 ppid=1 pid=1717 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:20.084000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:37:20.085616 sshd[1717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:37:20.089895 systemd[1]: Started session-9.scope. Oct 2 20:37:20.090305 systemd-logind[1339]: New session 9 of user core. Oct 2 20:37:20.093000 audit[1717]: USER_START pid=1717 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.096000 audit[1719]: CRED_ACQ pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:37:20.322000 audit[1720]: USER_ACCT pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.322899 sudo[1720]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:37:20.322000 audit[1720]: CRED_REFR pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:20.323381 sudo[1720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:37:20.324000 audit[1720]: USER_START pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:37:21.571993 systemd[1]: Starting docker.service... Oct 2 20:37:21.618788 env[1735]: time="2023-10-02T20:37:21.618735067Z" level=info msg="Starting up" Oct 2 20:37:21.622997 env[1735]: time="2023-10-02T20:37:21.622966168Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:21.623115 env[1735]: time="2023-10-02T20:37:21.623101889Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:21.623180 env[1735]: time="2023-10-02T20:37:21.623165409Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:21.623234 env[1735]: time="2023-10-02T20:37:21.623222690Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:21.625744 env[1735]: time="2023-10-02T20:37:21.625713302Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:37:21.625744 env[1735]: time="2023-10-02T20:37:21.625739062Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:37:21.625836 env[1735]: time="2023-10-02T20:37:21.625754022Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:37:21.625836 env[1735]: time="2023-10-02T20:37:21.625763542Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:37:21.731438 env[1735]: time="2023-10-02T20:37:21.731399468Z" level=info msg="Loading containers: start." Oct 2 20:37:21.850000 audit[1763]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.850000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe9b0a010 a2=0 a3=1 items=0 ppid=1735 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.850000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 20:37:21.853000 audit[1765]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.853000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd9198f50 a2=0 a3=1 items=0 ppid=1735 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.853000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 20:37:21.856000 audit[1767]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.856000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe04fe8d0 a2=0 a3=1 items=0 ppid=1735 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:21.859000 audit[1769]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.859000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdc76be20 a2=0 a3=1 items=0 ppid=1735 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:21.862000 audit[1771]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.862000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe24f0060 a2=0 a3=1 items=0 ppid=1735 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 20:37:21.865000 audit[1773]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.865000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff9488aa0 a2=0 a3=1 items=0 ppid=1735 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 20:37:21.880000 audit[1775]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.880000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa5f0620 a2=0 a3=1 items=0 ppid=1735 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.880000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 20:37:21.883000 audit[1777]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.883000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe4449aa0 a2=0 a3=1 items=0 ppid=1735 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 20:37:21.886000 audit[1779]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.886000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe1c56740 a2=0 a3=1 items=0 ppid=1735 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.886000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:21.904000 audit[1783]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.904000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff6801d90 a2=0 a3=1 items=0 ppid=1735 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:21.905000 audit[1784]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:21.905000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdd7fcbd0 a2=0 a3=1 items=0 ppid=1735 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:21.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:21.959552 kernel: Initializing XFRM netlink socket Oct 2 20:37:21.983138 env[1735]: time="2023-10-02T20:37:21.983096161Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 20:37:22.056000 audit[1792]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.056000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc470da50 a2=0 a3=1 items=0 ppid=1735 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.056000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 20:37:22.093000 audit[1795]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.093000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdaece9e0 a2=0 a3=1 items=0 ppid=1735 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 20:37:22.098000 audit[1798]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.098000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffffa3c620 a2=0 a3=1 items=0 ppid=1735 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:22.101000 audit[1800]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.101000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc765a830 a2=0 a3=1 items=0 ppid=1735 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 20:37:22.105000 audit[1802]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.105000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc754ff80 a2=0 a3=1 items=0 ppid=1735 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 20:37:22.108000 audit[1804]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.108000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc00c78b0 a2=0 a3=1 items=0 ppid=1735 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 20:37:22.111000 audit[1806]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.111000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe0c6b2c0 a2=0 a3=1 items=0 ppid=1735 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 20:37:22.114000 audit[1808]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.114000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffad36a30 a2=0 a3=1 items=0 ppid=1735 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 20:37:22.117000 audit[1810]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.117000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff94e5540 a2=0 a3=1 items=0 ppid=1735 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.117000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:37:22.120000 audit[1812]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.120000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd78c8430 a2=0 a3=1 items=0 ppid=1735 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:37:22.123000 audit[1814]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.123000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffed44ebf0 a2=0 a3=1 items=0 ppid=1735 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 20:37:22.124384 systemd-networkd[1500]: docker0: Link UP Oct 2 20:37:22.152000 audit[1818]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.152000 audit[1818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff5d79360 a2=0 a3=1 items=0 ppid=1735 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:22.154000 audit[1819]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:22.154000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff910d090 a2=0 a3=1 items=0 ppid=1735 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:22.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:37:22.155967 env[1735]: time="2023-10-02T20:37:22.155934253Z" level=info msg="Loading containers: done." Oct 2 20:37:22.185313 env[1735]: time="2023-10-02T20:37:22.185267430Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 20:37:22.185779 env[1735]: time="2023-10-02T20:37:22.185760392Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 20:37:22.185988 env[1735]: time="2023-10-02T20:37:22.185972473Z" level=info msg="Daemon has completed initialization" Oct 2 20:37:22.216501 systemd[1]: Started docker.service. Oct 2 20:37:22.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:22.221001 env[1735]: time="2023-10-02T20:37:22.220928676Z" level=info msg="API listen on /run/docker.sock" Oct 2 20:37:22.243856 systemd[1]: Reloading. Oct 2 20:37:22.327998 /usr/lib/systemd/system-generators/torcx-generator[1867]: time="2023-10-02T20:37:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:22.328317 /usr/lib/systemd/system-generators/torcx-generator[1867]: time="2023-10-02T20:37:22Z" level=info msg="torcx already run" Oct 2 20:37:22.440317 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:22.440336 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:22.458300 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit: BPF prog-id=38 op=LOAD Oct 2 20:37:22.528000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.528000 audit: BPF prog-id=39 op=LOAD Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit: BPF prog-id=40 op=LOAD Oct 2 20:37:22.529000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:37:22.529000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit: BPF prog-id=41 op=LOAD Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit: BPF prog-id=42 op=LOAD Oct 2 20:37:22.529000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:37:22.529000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.529000 audit: BPF prog-id=43 op=LOAD Oct 2 20:37:22.529000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit: BPF prog-id=44 op=LOAD Oct 2 20:37:22.530000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit: BPF prog-id=45 op=LOAD Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.530000 audit: BPF prog-id=46 op=LOAD Oct 2 20:37:22.530000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:37:22.530000 audit: BPF prog-id=23 op=UNLOAD Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.532000 audit: BPF prog-id=47 op=LOAD Oct 2 20:37:22.532000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.533000 audit: BPF prog-id=48 op=LOAD Oct 2 20:37:22.533000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.534000 audit: BPF prog-id=49 op=LOAD Oct 2 20:37:22.534000 audit: BPF prog-id=30 op=UNLOAD Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit: BPF prog-id=50 op=LOAD Oct 2 20:37:22.535000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit: BPF prog-id=51 op=LOAD Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:22.535000 audit: BPF prog-id=52 op=LOAD Oct 2 20:37:22.535000 audit: BPF prog-id=33 op=UNLOAD Oct 2 20:37:22.535000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:37:22.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:22.552856 systemd[1]: Started kubelet.service. Oct 2 20:37:22.640178 kubelet[1926]: E1002 20:37:22.640115 1926 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:22.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:22.642418 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:22.642553 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:26.397789 env[1352]: time="2023-10-02T20:37:26.397736133Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 20:37:27.161714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount919702608.mount: Deactivated successfully. Oct 2 20:37:29.362792 env[1352]: time="2023-10-02T20:37:29.362737994Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:29.368391 env[1352]: time="2023-10-02T20:37:29.368356450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84fc12f356926a06f93f99d06ff6b5c8df1d39c609ddaae4aaf09048dc816c36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:29.371687 env[1352]: time="2023-10-02T20:37:29.371655820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:29.375766 env[1352]: time="2023-10-02T20:37:29.375727472Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:29.376363 env[1352]: time="2023-10-02T20:37:29.376338154Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:84fc12f356926a06f93f99d06ff6b5c8df1d39c609ddaae4aaf09048dc816c36\"" Oct 2 20:37:29.389984 env[1352]: time="2023-10-02T20:37:29.389956395Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 20:37:31.531768 env[1352]: time="2023-10-02T20:37:31.531713545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.538714 env[1352]: time="2023-10-02T20:37:31.538680885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b19e3051492d4e2377e15803f07d9bd2a4578c7e26e5fa088582d59e08884b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.543284 env[1352]: time="2023-10-02T20:37:31.543221138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.547791 env[1352]: time="2023-10-02T20:37:31.547760711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:31.548203 env[1352]: time="2023-10-02T20:37:31.548179192Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:66b19e3051492d4e2377e15803f07d9bd2a4578c7e26e5fa088582d59e08884b\"" Oct 2 20:37:31.563037 env[1352]: time="2023-10-02T20:37:31.562982474Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 20:37:32.834306 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 20:37:32.834487 systemd[1]: Stopped kubelet.service. Oct 2 20:37:32.835884 systemd[1]: Started kubelet.service. Oct 2 20:37:32.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.840512 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 20:37:32.840600 kernel: audit: type=1130 audit(1696279052.833:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.873403 kernel: audit: type=1131 audit(1696279052.834:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.873555 kernel: audit: type=1130 audit(1696279052.835:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:32.977890 kubelet[1955]: E1002 20:37:32.977850 1955 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:32.980398 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:32.980536 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:32.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:32.998556 kernel: audit: type=1131 audit(1696279052.980:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:33.326760 env[1352]: time="2023-10-02T20:37:33.326654529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.337507 env[1352]: time="2023-10-02T20:37:33.337468118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1faa1d898c625343f7c70abbc8e9d160eb6dc3002ec2481cf8f4abd61dc34eed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.342782 env[1352]: time="2023-10-02T20:37:33.342751932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.347836 env[1352]: time="2023-10-02T20:37:33.347805945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:33.348586 env[1352]: time="2023-10-02T20:37:33.348558427Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:1faa1d898c625343f7c70abbc8e9d160eb6dc3002ec2481cf8f4abd61dc34eed\"" Oct 2 20:37:33.362205 env[1352]: time="2023-10-02T20:37:33.362168184Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 20:37:34.486008 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3851257100.mount: Deactivated successfully. Oct 2 20:37:35.478967 env[1352]: time="2023-10-02T20:37:35.478919740Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.489297 env[1352]: time="2023-10-02T20:37:35.489258007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.492652 env[1352]: time="2023-10-02T20:37:35.492617855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.495571 env[1352]: time="2023-10-02T20:37:35.495538743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:35.496066 env[1352]: time="2023-10-02T20:37:35.496031864Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:95195e68173b6cfcdd3125d7bbffa6759189df53b60ffe7a72256059cd5dd7af\"" Oct 2 20:37:35.509793 env[1352]: time="2023-10-02T20:37:35.509756259Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 20:37:36.178377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3487541504.mount: Deactivated successfully. Oct 2 20:37:36.201943 env[1352]: time="2023-10-02T20:37:36.201903756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.208966 env[1352]: time="2023-10-02T20:37:36.208934213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.212597 env[1352]: time="2023-10-02T20:37:36.212562422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.218897 env[1352]: time="2023-10-02T20:37:36.218872638Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:36.219350 env[1352]: time="2023-10-02T20:37:36.219325119Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 20:37:36.232169 env[1352]: time="2023-10-02T20:37:36.232134350Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 20:37:37.073755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1025495832.mount: Deactivated successfully. Oct 2 20:37:41.215067 env[1352]: time="2023-10-02T20:37:41.215009792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:41.221697 env[1352]: time="2023-10-02T20:37:41.221650127Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:41.226833 env[1352]: time="2023-10-02T20:37:41.226805178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:41.231592 env[1352]: time="2023-10-02T20:37:41.231565908Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:41.232261 env[1352]: time="2023-10-02T20:37:41.232236429Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Oct 2 20:37:41.245292 env[1352]: time="2023-10-02T20:37:41.245258377Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 20:37:42.025205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount335748758.mount: Deactivated successfully. Oct 2 20:37:42.674485 env[1352]: time="2023-10-02T20:37:42.674428775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.679958 env[1352]: time="2023-10-02T20:37:42.679918067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.683428 env[1352]: time="2023-10-02T20:37:42.683377874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.686531 env[1352]: time="2023-10-02T20:37:42.686490120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:42.686800 env[1352]: time="2023-10-02T20:37:42.686775161Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 20:37:43.084428 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 20:37:43.084622 systemd[1]: Stopped kubelet.service. Oct 2 20:37:43.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.086051 systemd[1]: Started kubelet.service. Oct 2 20:37:43.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.121480 kernel: audit: type=1130 audit(1696279063.084:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.121687 kernel: audit: type=1131 audit(1696279063.084:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.121749 kernel: audit: type=1130 audit(1696279063.084:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:43.210398 kubelet[1987]: E1002 20:37:43.210359 1987 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:37:43.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:43.212873 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:37:43.212990 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:37:43.231543 kernel: audit: type=1131 audit(1696279063.212:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:37:46.735170 systemd[1]: Stopped kubelet.service. Oct 2 20:37:46.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:46.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:46.770884 kernel: audit: type=1130 audit(1696279066.735:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:46.770971 kernel: audit: type=1131 audit(1696279066.735:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:46.790350 systemd[1]: Reloading. Oct 2 20:37:46.895836 /usr/lib/systemd/system-generators/torcx-generator[2073]: time="2023-10-02T20:37:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:46.896145 /usr/lib/systemd/system-generators/torcx-generator[2073]: time="2023-10-02T20:37:46Z" level=info msg="torcx already run" Oct 2 20:37:46.962604 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:46.962622 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:46.979561 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080747 kernel: audit: type=1400 audit(1696279067.044:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080823 kernel: audit: type=1400 audit(1696279067.044:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080856 kernel: audit: type=1400 audit(1696279067.044:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114639 kernel: audit: type=1400 audit(1696279067.044:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit: BPF prog-id=53 op=LOAD Oct 2 20:37:47.062000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit: BPF prog-id=54 op=LOAD Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit: BPF prog-id=55 op=LOAD Oct 2 20:37:47.097000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:37:47.097000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit: BPF prog-id=56 op=LOAD Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.114000 audit: BPF prog-id=57 op=LOAD Oct 2 20:37:47.114000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:37:47.114000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.116000 audit: BPF prog-id=58 op=LOAD Oct 2 20:37:47.116000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit: BPF prog-id=59 op=LOAD Oct 2 20:37:47.117000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit: BPF prog-id=60 op=LOAD Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.118000 audit: BPF prog-id=61 op=LOAD Oct 2 20:37:47.118000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:37:47.118000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.120000 audit: BPF prog-id=62 op=LOAD Oct 2 20:37:47.120000 audit: BPF prog-id=47 op=UNLOAD Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.122000 audit: BPF prog-id=63 op=LOAD Oct 2 20:37:47.122000 audit: BPF prog-id=48 op=UNLOAD Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.123000 audit: BPF prog-id=64 op=LOAD Oct 2 20:37:47.123000 audit: BPF prog-id=49 op=UNLOAD Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit: BPF prog-id=65 op=LOAD Oct 2 20:37:47.125000 audit: BPF prog-id=50 op=UNLOAD Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit: BPF prog-id=66 op=LOAD Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.126000 audit: BPF prog-id=67 op=LOAD Oct 2 20:37:47.126000 audit: BPF prog-id=51 op=UNLOAD Oct 2 20:37:47.126000 audit: BPF prog-id=52 op=UNLOAD Oct 2 20:37:47.150839 systemd[1]: Started kubelet.service. Oct 2 20:37:47.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:47.226362 kubelet[2133]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:47.226698 kubelet[2133]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:47.226745 kubelet[2133]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:47.226916 kubelet[2133]: I1002 20:37:47.226885 2133 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:47.938896 kubelet[2133]: I1002 20:37:47.938860 2133 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 20:37:47.938896 kubelet[2133]: I1002 20:37:47.938888 2133 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:47.940494 kubelet[2133]: I1002 20:37:47.940472 2133 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 20:37:47.946600 kubelet[2133]: E1002 20:37:47.946583 2133 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.38:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.946764 kubelet[2133]: I1002 20:37:47.946751 2133 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:47.948474 kubelet[2133]: W1002 20:37:47.948457 2133 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:47.949027 kubelet[2133]: I1002 20:37:47.949012 2133 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:47.949280 kubelet[2133]: I1002 20:37:47.949268 2133 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:47.949347 kubelet[2133]: I1002 20:37:47.949331 2133 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:37:47.949421 kubelet[2133]: I1002 20:37:47.949373 2133 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:47.949421 kubelet[2133]: I1002 20:37:47.949383 2133 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 20:37:47.949509 kubelet[2133]: I1002 20:37:47.949488 2133 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:47.952347 kubelet[2133]: I1002 20:37:47.952327 2133 kubelet.go:405] "Attempting to sync node with API server" Oct 2 20:37:47.952347 kubelet[2133]: I1002 20:37:47.952349 2133 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:47.952494 kubelet[2133]: I1002 20:37:47.952365 2133 kubelet.go:309] "Adding apiserver pod source" Oct 2 20:37:47.952494 kubelet[2133]: I1002 20:37:47.952402 2133 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:47.953386 kubelet[2133]: W1002 20:37:47.953350 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.953485 kubelet[2133]: E1002 20:37:47.953474 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.953633 kubelet[2133]: W1002 20:37:47.953605 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-96ab8c487b&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.953728 kubelet[2133]: E1002 20:37:47.953717 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-96ab8c487b&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.953871 kubelet[2133]: I1002 20:37:47.953859 2133 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:47.954260 kubelet[2133]: W1002 20:37:47.954244 2133 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:37:47.954850 kubelet[2133]: I1002 20:37:47.954834 2133 server.go:1168] "Started kubelet" Oct 2 20:37:47.955000 audit[2133]: AVC avc: denied { mac_admin } for pid=2133 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.955000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:47.955000 audit[2133]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000577740 a1=400087acc0 a2=4000577710 a3=25 items=0 ppid=1 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.955000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:47.956944 kubelet[2133]: I1002 20:37:47.956931 2133 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:47.956000 audit[2133]: AVC avc: denied { mac_admin } for pid=2133 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:47.956000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:47.956000 audit[2133]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c32100 a1=400087acd8 a2=40005777d0 a3=25 items=0 ppid=1 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.957406 kubelet[2133]: E1002 20:37:47.957326 2133 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-96ab8c487b.178a64d33560a265", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-96ab8c487b", UID:"ci-3510.3.0-a-96ab8c487b", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-96ab8c487b"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 954815589, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 954815589, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.38:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.38:6443: connect: connection refused'(may retry after sleeping) Oct 2 20:37:47.956000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:47.957687 kubelet[2133]: I1002 20:37:47.957673 2133 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:47.957798 kubelet[2133]: E1002 20:37:47.957777 2133 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:47.957854 kubelet[2133]: E1002 20:37:47.957800 2133 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:47.958090 kubelet[2133]: I1002 20:37:47.958075 2133 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:47.958355 kubelet[2133]: I1002 20:37:47.958330 2133 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:47.958987 kubelet[2133]: I1002 20:37:47.958954 2133 server.go:461] "Adding debug handlers to kubelet server" Oct 2 20:37:47.959832 kubelet[2133]: I1002 20:37:47.959806 2133 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 20:37:47.961783 kubelet[2133]: I1002 20:37:47.961630 2133 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 20:37:47.961783 kubelet[2133]: I1002 20:37:47.961726 2133 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 20:37:47.962019 kubelet[2133]: W1002 20:37:47.961978 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.962019 kubelet[2133]: E1002 20:37:47.962018 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:47.962998 kubelet[2133]: E1002 20:37:47.962969 2133 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-96ab8c487b?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="200ms" Oct 2 20:37:47.963000 audit[2145]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:47.963000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=fffff5c3dc00 a2=0 a3=1 items=0 ppid=2133 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:47.965000 audit[2146]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:47.965000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=4 a1=ffffebf17520 a2=0 a3=1 items=0 ppid=2133 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:37:47.968000 audit[2148]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:47.968000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=4 a1=fffffa8a03e0 a2=0 a3=1 items=0 ppid=2133 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:47.971000 audit[2150]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:47.971000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=4 a1=ffffc2dba0a0 a2=0 a3=1 items=0 ppid=2133 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:47.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:37:48.055000 audit[2155]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:48.055000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=4 a1=ffffe29b0700 a2=0 a3=1 items=0 ppid=2133 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:37:48.056796 kubelet[2133]: I1002 20:37:48.056771 2133 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:48.057000 audit[2157]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:48.057000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=fffff0d08bd0 a2=0 a3=1 items=0 ppid=2133 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:37:48.058433 kubelet[2133]: I1002 20:37:48.058385 2133 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:48.058487 kubelet[2133]: I1002 20:37:48.058440 2133 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 20:37:48.058487 kubelet[2133]: I1002 20:37:48.058459 2133 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 20:37:48.058555 kubelet[2133]: E1002 20:37:48.058506 2133 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:37:48.059205 kubelet[2133]: W1002 20:37:48.059161 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:48.059280 kubelet[2133]: E1002 20:37:48.059210 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:48.059000 audit[2158]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:48.059000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffee249420 a2=0 a3=1 items=0 ppid=2133 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:48.060000 audit[2161]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:48.060000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffd1b050d0 a2=0 a3=1 items=0 ppid=2133 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:37:48.061000 audit[2162]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:48.061000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=4 a1=ffffcffae490 a2=0 a3=1 items=0 ppid=2133 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:48.062000 audit[2163]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:48.062000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=4 a1=ffffd6af0600 a2=0 a3=1 items=0 ppid=2133 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:37:48.063000 audit[2164]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:37:48.063000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffcb804860 a2=0 a3=1 items=0 ppid=2133 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:48.063000 audit[2165]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:37:48.063000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=ffffd4bf20d0 a2=0 a3=1 items=0 ppid=2133 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:37:48.092711 kubelet[2133]: I1002 20:37:48.092689 2133 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.093632 kubelet[2133]: I1002 20:37:48.093616 2133 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:37:48.094058 kubelet[2133]: I1002 20:37:48.094031 2133 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:48.094058 kubelet[2133]: I1002 20:37:48.094059 2133 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:48.094245 kubelet[2133]: E1002 20:37:48.093947 2133 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.117626 kubelet[2133]: I1002 20:37:48.117591 2133 policy_none.go:49] "None policy: Start" Oct 2 20:37:48.118407 kubelet[2133]: I1002 20:37:48.118388 2133 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:37:48.118496 kubelet[2133]: I1002 20:37:48.118416 2133 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:48.126971 systemd[1]: Created slice kubepods.slice. Oct 2 20:37:48.130950 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:37:48.134056 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:37:48.142182 kubelet[2133]: I1002 20:37:48.142159 2133 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:48.141000 audit[2133]: AVC avc: denied { mac_admin } for pid=2133 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.143141 kubelet[2133]: I1002 20:37:48.142234 2133 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:48.143141 kubelet[2133]: I1002 20:37:48.142419 2133 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:48.147538 kernel: kauditd_printk_skb: 213 callbacks suppressed Oct 2 20:37:48.147586 kernel: audit: type=1400 audit(1696279068.141:590): avc: denied { mac_admin } for pid=2133 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:48.148336 kubelet[2133]: E1002 20:37:48.148317 2133 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-96ab8c487b\" not found" Oct 2 20:37:48.158738 kubelet[2133]: I1002 20:37:48.158720 2133 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:48.163705 kubelet[2133]: E1002 20:37:48.163677 2133 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-96ab8c487b?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="400ms" Oct 2 20:37:48.141000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:48.167232 kubelet[2133]: I1002 20:37:48.167215 2133 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:48.175047 kernel: audit: type=1401 audit(1696279068.141:590): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:48.141000 audit[2133]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e50fc0 a1=4000cbf200 a2=4000e50f90 a3=25 items=0 ppid=1 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.178422 kubelet[2133]: I1002 20:37:48.178405 2133 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:48.182905 systemd[1]: Created slice kubepods-burstable-pode16160933961a3d6bb95dae966db723f.slice. Oct 2 20:37:48.201020 kernel: audit: type=1300 audit(1696279068.141:590): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e50fc0 a1=4000cbf200 a2=4000e50f90 a3=25 items=0 ppid=1 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:48.141000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:48.209909 systemd[1]: Created slice kubepods-burstable-pod4515d2d7a32327a4fd0ad19f19bb0584.slice. Oct 2 20:37:48.225491 kernel: audit: type=1327 audit(1696279068.141:590): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:48.238431 systemd[1]: Created slice kubepods-burstable-podc3577b2eef501c0ad6394385f215979c.slice. Oct 2 20:37:48.262664 kubelet[2133]: I1002 20:37:48.262635 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.263047 kubelet[2133]: I1002 20:37:48.263032 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.263155 kubelet[2133]: I1002 20:37:48.263145 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.296244 kubelet[2133]: I1002 20:37:48.296220 2133 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.296538 kubelet[2133]: E1002 20:37:48.296508 2133 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.363932 kubelet[2133]: I1002 20:37:48.363904 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.364024 kubelet[2133]: I1002 20:37:48.363965 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.364024 kubelet[2133]: I1002 20:37:48.364004 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.364075 kubelet[2133]: I1002 20:37:48.364070 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c3577b2eef501c0ad6394385f215979c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-96ab8c487b\" (UID: \"c3577b2eef501c0ad6394385f215979c\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.364100 kubelet[2133]: I1002 20:37:48.364090 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.364123 kubelet[2133]: I1002 20:37:48.364110 2133 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.513191 env[1352]: time="2023-10-02T20:37:48.512852032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-96ab8c487b,Uid:4515d2d7a32327a4fd0ad19f19bb0584,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:48.513751 env[1352]: time="2023-10-02T20:37:48.513718513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-96ab8c487b,Uid:e16160933961a3d6bb95dae966db723f,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:48.543059 env[1352]: time="2023-10-02T20:37:48.543013566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-96ab8c487b,Uid:c3577b2eef501c0ad6394385f215979c,Namespace:kube-system,Attempt:0,}" Oct 2 20:37:48.564893 kubelet[2133]: E1002 20:37:48.564862 2133 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-96ab8c487b?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="800ms" Oct 2 20:37:48.698782 kubelet[2133]: I1002 20:37:48.698752 2133 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:48.699100 kubelet[2133]: E1002 20:37:48.699082 2133 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:49.024276 kubelet[2133]: W1002 20:37:49.024202 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.024276 kubelet[2133]: E1002 20:37:49.024256 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.150769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2596759545.mount: Deactivated successfully. Oct 2 20:37:49.185022 env[1352]: time="2023-10-02T20:37:49.184983588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.199264 kubelet[2133]: W1002 20:37:49.199214 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-96ab8c487b&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.199264 kubelet[2133]: E1002 20:37:49.199271 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-96ab8c487b&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.206300 env[1352]: time="2023-10-02T20:37:49.206266506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.213495 env[1352]: time="2023-10-02T20:37:49.213462598Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.217139 env[1352]: time="2023-10-02T20:37:49.217114685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.220845 env[1352]: time="2023-10-02T20:37:49.220808651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.225949 env[1352]: time="2023-10-02T20:37:49.225921460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.229810 env[1352]: time="2023-10-02T20:37:49.229787107Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.235571 env[1352]: time="2023-10-02T20:37:49.235541437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.240432 env[1352]: time="2023-10-02T20:37:49.240408005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.243211 env[1352]: time="2023-10-02T20:37:49.243177810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.249350 env[1352]: time="2023-10-02T20:37:49.249314061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.251847 env[1352]: time="2023-10-02T20:37:49.251823265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:37:49.293041 env[1352]: time="2023-10-02T20:37:49.292899817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:49.293041 env[1352]: time="2023-10-02T20:37:49.292940577Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:49.293417 env[1352]: time="2023-10-02T20:37:49.292951177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:49.293656 env[1352]: time="2023-10-02T20:37:49.293621858Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557 pid=2174 runtime=io.containerd.runc.v2 Oct 2 20:37:49.311985 systemd[1]: Started cri-containerd-2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557.scope. Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363416 kernel: audit: type=1400 audit(1696279069.328:591): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363567 kernel: audit: type=1400 audit(1696279069.328:592): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381152 kernel: audit: type=1400 audit(1696279069.328:593): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381700 kubelet[2133]: E1002 20:37:49.381575 2133 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-96ab8c487b?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="1.6s" Oct 2 20:37:49.399262 kernel: audit: type=1400 audit(1696279069.328:594): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.418165 kernel: audit: type=1400 audit(1696279069.328:595): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.436897 kernel: audit: type=1400 audit(1696279069.328:596): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit: BPF prog-id=68 op=LOAD Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2174 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266356534336136666433393766376263383930613630633033373865 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2174 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266356534336136666433393766376263383930613630633033373865 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.346000 audit: BPF prog-id=69 op=LOAD Oct 2 20:37:49.346000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2174 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266356534336136666433393766376263383930613630633033373865 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.363000 audit: BPF prog-id=70 op=LOAD Oct 2 20:37:49.363000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2174 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266356534336136666433393766376263383930613630633033373865 Oct 2 20:37:49.380000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:37:49.380000 audit: BPF prog-id=69 op=UNLOAD Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.381000 audit: BPF prog-id=71 op=LOAD Oct 2 20:37:49.381000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2174 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266356534336136666433393766376263383930613630633033373865 Oct 2 20:37:49.438392 kubelet[2133]: W1002 20:37:49.436820 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.438392 kubelet[2133]: E1002 20:37:49.436868 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.454470 env[1352]: time="2023-10-02T20:37:49.454402459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:49.454670 env[1352]: time="2023-10-02T20:37:49.454640540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:49.454774 env[1352]: time="2023-10-02T20:37:49.454747820Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:49.454990 env[1352]: time="2023-10-02T20:37:49.454957660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286 pid=2217 runtime=io.containerd.runc.v2 Oct 2 20:37:49.458258 env[1352]: time="2023-10-02T20:37:49.458201026Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:37:49.458258 env[1352]: time="2023-10-02T20:37:49.458233146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:37:49.458381 env[1352]: time="2023-10-02T20:37:49.458260906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:37:49.458421 env[1352]: time="2023-10-02T20:37:49.458400546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7dd2b91ca5d41c408c525fe67fd92c5b25fee0322703f744dd935a7b4b383ef pid=2213 runtime=io.containerd.runc.v2 Oct 2 20:37:49.467029 env[1352]: time="2023-10-02T20:37:49.466995241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-96ab8c487b,Uid:4515d2d7a32327a4fd0ad19f19bb0584,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557\"" Oct 2 20:37:49.470354 env[1352]: time="2023-10-02T20:37:49.470325367Z" level=info msg="CreateContainer within sandbox \"2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 20:37:49.485466 systemd[1]: Started cri-containerd-f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286.scope. Oct 2 20:37:49.491282 systemd[1]: Started cri-containerd-a7dd2b91ca5d41c408c525fe67fd92c5b25fee0322703f744dd935a7b4b383ef.scope. Oct 2 20:37:49.503036 kubelet[2133]: I1002 20:37:49.502710 2133 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:49.503036 kubelet[2133]: E1002 20:37:49.503007 2133 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.507000 audit: BPF prog-id=72 op=LOAD Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2213 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646432623931636135643431633430386335323566653637666439 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2213 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646432623931636135643431633430386335323566653637666439 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit: BPF prog-id=73 op=LOAD Oct 2 20:37:49.508000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2213 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646432623931636135643431633430386335323566653637666439 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit: BPF prog-id=74 op=LOAD Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit: BPF prog-id=75 op=LOAD Oct 2 20:37:49.508000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2213 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646432623931636135643431633430386335323566653637666439 Oct 2 20:37:49.508000 audit: BPF prog-id=75 op=UNLOAD Oct 2 20:37:49.508000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2217 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636633164353563663339613166613038393232333462626536343933 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2217 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636633164353563663339613166613038393232333462626536343933 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit: BPF prog-id=76 op=LOAD Oct 2 20:37:49.509000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2217 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636633164353563663339613166613038393232333462626536343933 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit: BPF prog-id=77 op=LOAD Oct 2 20:37:49.509000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2217 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636633164353563663339613166613038393232333462626536343933 Oct 2 20:37:49.509000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:37:49.509000 audit: BPF prog-id=76 op=UNLOAD Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.509000 audit: BPF prog-id=78 op=LOAD Oct 2 20:37:49.509000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2217 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636633164353563663339613166613038393232333462626536343933 Oct 2 20:37:49.508000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.508000 audit: BPF prog-id=79 op=LOAD Oct 2 20:37:49.508000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2213 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137646432623931636135643431633430386335323566653637666439 Oct 2 20:37:49.512929 env[1352]: time="2023-10-02T20:37:49.512658201Z" level=info msg="CreateContainer within sandbox \"2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e\"" Oct 2 20:37:49.513589 env[1352]: time="2023-10-02T20:37:49.513491883Z" level=info msg="StartContainer for \"c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e\"" Oct 2 20:37:49.521988 kubelet[2133]: W1002 20:37:49.521920 2133 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.521988 kubelet[2133]: E1002 20:37:49.521955 2133 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Oct 2 20:37:49.548407 env[1352]: time="2023-10-02T20:37:49.543772736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-96ab8c487b,Uid:e16160933961a3d6bb95dae966db723f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a7dd2b91ca5d41c408c525fe67fd92c5b25fee0322703f744dd935a7b4b383ef\"" Oct 2 20:37:49.550833 env[1352]: time="2023-10-02T20:37:49.550780108Z" level=info msg="CreateContainer within sandbox \"a7dd2b91ca5d41c408c525fe67fd92c5b25fee0322703f744dd935a7b4b383ef\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 20:37:49.556308 env[1352]: time="2023-10-02T20:37:49.556274157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-96ab8c487b,Uid:c3577b2eef501c0ad6394385f215979c,Namespace:kube-system,Attempt:0,} returns sandbox id \"f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286\"" Oct 2 20:37:49.560651 systemd[1]: Started cri-containerd-c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e.scope. Oct 2 20:37:49.567038 env[1352]: time="2023-10-02T20:37:49.566989256Z" level=info msg="CreateContainer within sandbox \"f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit: BPF prog-id=80 op=LOAD Oct 2 20:37:49.579000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2174 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330343232376530613532616465653830656636336238306134363363 Oct 2 20:37:49.579000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.579000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2174 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330343232376530613532616465653830656636336238306134363363 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit: BPF prog-id=81 op=LOAD Oct 2 20:37:49.580000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2174 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330343232376530613532616465653830656636336238306134363363 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit: BPF prog-id=82 op=LOAD Oct 2 20:37:49.580000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2174 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330343232376530613532616465653830656636336238306134363363 Oct 2 20:37:49.580000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:37:49.580000 audit: BPF prog-id=81 op=UNLOAD Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.580000 audit: BPF prog-id=83 op=LOAD Oct 2 20:37:49.580000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2174 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330343232376530613532616465653830656636336238306134363363 Oct 2 20:37:49.610937 env[1352]: time="2023-10-02T20:37:49.610132372Z" level=info msg="CreateContainer within sandbox \"a7dd2b91ca5d41c408c525fe67fd92c5b25fee0322703f744dd935a7b4b383ef\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8bd7dea3fba4451b51293cc26d75a5ff5f2b60794dce13fffa7c6567ccf7a081\"" Oct 2 20:37:49.612217 env[1352]: time="2023-10-02T20:37:49.612191575Z" level=info msg="StartContainer for \"8bd7dea3fba4451b51293cc26d75a5ff5f2b60794dce13fffa7c6567ccf7a081\"" Oct 2 20:37:49.613540 env[1352]: time="2023-10-02T20:37:49.613490058Z" level=info msg="CreateContainer within sandbox \"f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb\"" Oct 2 20:37:49.617209 env[1352]: time="2023-10-02T20:37:49.617177104Z" level=info msg="StartContainer for \"c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e\" returns successfully" Oct 2 20:37:49.617948 env[1352]: time="2023-10-02T20:37:49.617916825Z" level=info msg="StartContainer for \"81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb\"" Oct 2 20:37:49.643934 systemd[1]: Started cri-containerd-81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb.scope. Oct 2 20:37:49.658923 systemd[1]: Started cri-containerd-8bd7dea3fba4451b51293cc26d75a5ff5f2b60794dce13fffa7c6567ccf7a081.scope. Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.668000 audit: BPF prog-id=84 op=LOAD Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831656139323366383635386263313533313662376239613763626665 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831656139323366383635386263313533313662376239613763626665 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit: BPF prog-id=85 op=LOAD Oct 2 20:37:49.669000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831656139323366383635386263313533313662376239613763626665 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit: BPF prog-id=86 op=LOAD Oct 2 20:37:49.669000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831656139323366383635386263313533313662376239613763626665 Oct 2 20:37:49.669000 audit: BPF prog-id=86 op=UNLOAD Oct 2 20:37:49.669000 audit: BPF prog-id=85 op=UNLOAD Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.669000 audit: BPF prog-id=87 op=LOAD Oct 2 20:37:49.669000 audit[2346]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831656139323366383635386263313533313662376239613763626665 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit: BPF prog-id=88 op=LOAD Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2213 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643764656133666261343435316235313239336363323664373561 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2213 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643764656133666261343435316235313239336363323664373561 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.678000 audit: BPF prog-id=89 op=LOAD Oct 2 20:37:49.678000 audit[2340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2213 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643764656133666261343435316235313239336363323664373561 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit: BPF prog-id=90 op=LOAD Oct 2 20:37:49.679000 audit[2340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2213 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643764656133666261343435316235313239336363323664373561 Oct 2 20:37:49.679000 audit: BPF prog-id=90 op=UNLOAD Oct 2 20:37:49.679000 audit: BPF prog-id=89 op=UNLOAD Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:49.679000 audit: BPF prog-id=91 op=LOAD Oct 2 20:37:49.679000 audit[2340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2213 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:49.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643764656133666261343435316235313239336363323664373561 Oct 2 20:37:49.724353 env[1352]: time="2023-10-02T20:37:49.724299091Z" level=info msg="StartContainer for \"81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb\" returns successfully" Oct 2 20:37:49.734978 env[1352]: time="2023-10-02T20:37:49.734933670Z" level=info msg="StartContainer for \"8bd7dea3fba4451b51293cc26d75a5ff5f2b60794dce13fffa7c6567ccf7a081\" returns successfully" Oct 2 20:37:50.146659 systemd[1]: run-containerd-runc-k8s.io-2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557-runc.sFdvAH.mount: Deactivated successfully. Oct 2 20:37:51.104351 kubelet[2133]: I1002 20:37:51.104326 2133 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:52.503000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.503000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40037b6780 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.503000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.504000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.504000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40053b16c0 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.505000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.505000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40037b68a0 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.527000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.527000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4000d61470 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.528000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.528000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4006746460 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.529000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:52.529000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4000d61710 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:37:52.529000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:37:52.697801 kubelet[2133]: E1002 20:37:52.697764 2133 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-96ab8c487b\" not found" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:52.763346 kubelet[2133]: E1002 20:37:52.763170 2133 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-96ab8c487b.178a64d33560a265", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-96ab8c487b", UID:"ci-3510.3.0-a-96ab8c487b", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-96ab8c487b"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 954815589, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 954815589, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 20:37:52.854804 kubelet[2133]: I1002 20:37:52.854762 2133 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:52.871029 kubelet[2133]: E1002 20:37:52.870930 2133 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-96ab8c487b.178a64d3358e0eda", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-96ab8c487b", UID:"ci-3510.3.0-a-96ab8c487b", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-96ab8c487b"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 957792474, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 47, 957792474, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 20:37:52.955823 kubelet[2133]: I1002 20:37:52.955785 2133 apiserver.go:52] "Watching apiserver" Oct 2 20:37:53.057103 kubelet[2133]: E1002 20:37:53.056905 2133 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-96ab8c487b.178a64d33d97be86", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-96ab8c487b", UID:"ci-3510.3.0-a-96ab8c487b", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-96ab8c487b status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-96ab8c487b"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 37, 48, 92644998, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 37, 48, 92644998, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 20:37:53.062225 kubelet[2133]: I1002 20:37:53.062190 2133 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 20:37:53.100977 kubelet[2133]: I1002 20:37:53.100928 2133 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:37:53.226000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.231814 kernel: kauditd_printk_skb: 354 callbacks suppressed Oct 2 20:37:53.231972 kernel: audit: type=1400 audit(1696279073.226:705): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.258553 kernel: audit: type=1400 audit(1696279073.227:706): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.227000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:37:53.227000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400084c740 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:37:53.313793 kernel: audit: type=1300 audit(1696279073.227:706): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400084c740 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:37:53.227000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.226000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004bcab0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:37:53.369047 kernel: audit: type=1327 audit(1696279073.227:706): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.369146 kernel: audit: type=1300 audit(1696279073.226:705): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004bcab0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:37:53.226000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:53.395718 kernel: audit: type=1327 audit(1696279073.226:705): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:37:54.399618 kubelet[2133]: W1002 20:37:54.399587 2133 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:37:56.262456 systemd[1]: Reloading. Oct 2 20:37:56.341681 /usr/lib/systemd/system-generators/torcx-generator[2429]: time="2023-10-02T20:37:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:37:56.341708 /usr/lib/systemd/system-generators/torcx-generator[2429]: time="2023-10-02T20:37:56Z" level=info msg="torcx already run" Oct 2 20:37:56.472585 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:37:56.472602 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:37:56.489680 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.608677 kernel: audit: type=1400 audit(1696279076.565:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.608775 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:37:56.608811 kernel: audit: type=1400 audit(1696279076.565:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.608834 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.583000 audit: BPF prog-id=92 op=LOAD Oct 2 20:37:56.583000 audit: BPF prog-id=80 op=UNLOAD Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit: BPF prog-id=93 op=LOAD Oct 2 20:37:56.585000 audit: BPF prog-id=53 op=UNLOAD Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit: BPF prog-id=94 op=LOAD Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit: BPF prog-id=95 op=LOAD Oct 2 20:37:56.585000 audit: BPF prog-id=54 op=UNLOAD Oct 2 20:37:56.585000 audit: BPF prog-id=55 op=UNLOAD Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit: BPF prog-id=96 op=LOAD Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.585000 audit: BPF prog-id=97 op=LOAD Oct 2 20:37:56.614000 audit: BPF prog-id=57 op=UNLOAD Oct 2 20:37:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit: BPF prog-id=98 op=LOAD Oct 2 20:37:56.615000 audit: BPF prog-id=58 op=UNLOAD Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit: BPF prog-id=99 op=LOAD Oct 2 20:37:56.615000 audit: BPF prog-id=59 op=UNLOAD Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit: BPF prog-id=100 op=LOAD Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.615000 audit: BPF prog-id=101 op=LOAD Oct 2 20:37:56.615000 audit: BPF prog-id=60 op=UNLOAD Oct 2 20:37:56.615000 audit: BPF prog-id=61 op=UNLOAD Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.616000 audit: BPF prog-id=102 op=LOAD Oct 2 20:37:56.616000 audit: BPF prog-id=72 op=UNLOAD Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.618000 audit: BPF prog-id=103 op=LOAD Oct 2 20:37:56.618000 audit: BPF prog-id=62 op=UNLOAD Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.619000 audit: BPF prog-id=104 op=LOAD Oct 2 20:37:56.619000 audit: BPF prog-id=63 op=UNLOAD Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit: BPF prog-id=105 op=LOAD Oct 2 20:37:56.620000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.620000 audit: BPF prog-id=106 op=LOAD Oct 2 20:37:56.620000 audit: BPF prog-id=64 op=UNLOAD Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit: BPF prog-id=107 op=LOAD Oct 2 20:37:56.621000 audit: BPF prog-id=84 op=UNLOAD Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit: BPF prog-id=108 op=LOAD Oct 2 20:37:56.622000 audit: BPF prog-id=65 op=UNLOAD Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit: BPF prog-id=109 op=LOAD Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit: BPF prog-id=110 op=LOAD Oct 2 20:37:56.622000 audit: BPF prog-id=66 op=UNLOAD Oct 2 20:37:56.622000 audit: BPF prog-id=67 op=UNLOAD Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.622000 audit: BPF prog-id=111 op=LOAD Oct 2 20:37:56.622000 audit: BPF prog-id=88 op=UNLOAD Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.624000 audit: BPF prog-id=112 op=LOAD Oct 2 20:37:56.624000 audit: BPF prog-id=68 op=UNLOAD Oct 2 20:37:56.643215 systemd[1]: Stopping kubelet.service... Oct 2 20:37:56.665882 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 20:37:56.666081 systemd[1]: Stopped kubelet.service. Oct 2 20:37:56.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:56.666132 systemd[1]: kubelet.service: Consumed 1.086s CPU time. Oct 2 20:37:56.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:37:56.668274 systemd[1]: Started kubelet.service. Oct 2 20:37:56.754029 kubelet[2488]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:56.754029 kubelet[2488]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 20:37:56.754029 kubelet[2488]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:37:56.754353 kubelet[2488]: I1002 20:37:56.754109 2488 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:37:56.759969 kubelet[2488]: I1002 20:37:56.759942 2488 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 20:37:56.760095 kubelet[2488]: I1002 20:37:56.760086 2488 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:37:56.760346 kubelet[2488]: I1002 20:37:56.760332 2488 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 20:37:56.761832 kubelet[2488]: I1002 20:37:56.761815 2488 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 20:37:56.763468 kubelet[2488]: I1002 20:37:56.763445 2488 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:37:56.765818 kubelet[2488]: W1002 20:37:56.765805 2488 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 20:37:56.767345 kubelet[2488]: I1002 20:37:56.767313 2488 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:37:56.767755 kubelet[2488]: I1002 20:37:56.767738 2488 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:37:56.767900 kubelet[2488]: I1002 20:37:56.767887 2488 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:37:56.768053 kubelet[2488]: I1002 20:37:56.768040 2488 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:37:56.768122 kubelet[2488]: I1002 20:37:56.768113 2488 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 20:37:56.768198 kubelet[2488]: I1002 20:37:56.768189 2488 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:56.772315 kubelet[2488]: I1002 20:37:56.772297 2488 kubelet.go:405] "Attempting to sync node with API server" Oct 2 20:37:56.772415 kubelet[2488]: I1002 20:37:56.772405 2488 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:37:56.772544 kubelet[2488]: I1002 20:37:56.772533 2488 kubelet.go:309] "Adding apiserver pod source" Oct 2 20:37:56.772602 kubelet[2488]: I1002 20:37:56.772594 2488 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:37:56.778574 kubelet[2488]: I1002 20:37:56.778559 2488 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:37:56.779323 kubelet[2488]: I1002 20:37:56.779310 2488 server.go:1168] "Started kubelet" Oct 2 20:37:56.780000 audit[2488]: AVC avc: denied { mac_admin } for pid=2488 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.780000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:56.780000 audit[2488]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c7a0c0 a1=4000a727b0 a2=4000c7a090 a3=25 items=0 ppid=1 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:56.780000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:56.781728 kubelet[2488]: I1002 20:37:56.781714 2488 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:37:56.781000 audit[2488]: AVC avc: denied { mac_admin } for pid=2488 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.781000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:56.781000 audit[2488]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bce280 a1=4000a727c8 a2=4000c7a150 a3=25 items=0 ppid=1 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:56.781000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:56.781987 kubelet[2488]: I1002 20:37:56.781957 2488 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:37:56.782089 kubelet[2488]: I1002 20:37:56.782080 2488 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:37:56.792891 kubelet[2488]: I1002 20:37:56.792820 2488 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:37:56.793495 kubelet[2488]: I1002 20:37:56.793475 2488 server.go:461] "Adding debug handlers to kubelet server" Oct 2 20:37:56.794986 kubelet[2488]: I1002 20:37:56.794964 2488 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 20:37:56.796536 kubelet[2488]: I1002 20:37:56.796505 2488 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 20:37:56.797004 kubelet[2488]: I1002 20:37:56.796984 2488 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 20:37:56.797705 kubelet[2488]: E1002 20:37:56.797690 2488 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:37:56.797819 kubelet[2488]: E1002 20:37:56.797809 2488 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:37:56.841012 kubelet[2488]: I1002 20:37:56.840920 2488 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:37:56.848253 kubelet[2488]: I1002 20:37:56.848208 2488 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:37:56.848437 kubelet[2488]: I1002 20:37:56.848419 2488 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 20:37:56.848504 kubelet[2488]: I1002 20:37:56.848495 2488 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 20:37:56.848626 kubelet[2488]: E1002 20:37:56.848615 2488 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:37:56.896846 kubelet[2488]: I1002 20:37:56.896823 2488 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:37:56.896998 kubelet[2488]: I1002 20:37:56.896988 2488 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:37:56.897071 kubelet[2488]: I1002 20:37:56.897063 2488 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:37:56.897499 kubelet[2488]: I1002 20:37:56.897487 2488 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 20:37:56.897628 kubelet[2488]: I1002 20:37:56.897618 2488 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 20:37:56.897700 kubelet[2488]: I1002 20:37:56.897691 2488 policy_none.go:49] "None policy: Start" Oct 2 20:37:56.898711 kubelet[2488]: I1002 20:37:56.898693 2488 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:37:56.899705 kubelet[2488]: I1002 20:37:56.898804 2488 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:37:56.899990 kubelet[2488]: I1002 20:37:56.899976 2488 state_mem.go:75] "Updated machine memory state" Oct 2 20:37:56.904690 kubelet[2488]: I1002 20:37:56.904674 2488 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:56.909761 kubelet[2488]: I1002 20:37:56.909741 2488 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:37:56.909000 audit[2488]: AVC avc: denied { mac_admin } for pid=2488 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:37:56.909000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:37:56.909000 audit[2488]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400080f410 a1=4000ef4018 a2=400080f3e0 a3=25 items=0 ppid=1 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:37:56.909000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:37:56.910062 kubelet[2488]: I1002 20:37:56.909819 2488 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:37:56.910062 kubelet[2488]: I1002 20:37:56.910010 2488 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:37:56.921494 kubelet[2488]: I1002 20:37:56.921413 2488 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:56.921494 kubelet[2488]: I1002 20:37:56.921488 2488 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:56.949554 kubelet[2488]: I1002 20:37:56.949517 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:56.949828 kubelet[2488]: I1002 20:37:56.949812 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:56.949928 kubelet[2488]: I1002 20:37:56.949917 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:37:56.960355 kubelet[2488]: W1002 20:37:56.960329 2488 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:37:56.960793 kubelet[2488]: W1002 20:37:56.960770 2488 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:37:56.960966 kubelet[2488]: E1002 20:37:56.960943 2488 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-96ab8c487b\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:56.961047 kubelet[2488]: W1002 20:37:56.961025 2488 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:37:57.099203 kubelet[2488]: I1002 20:37:57.099108 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099363 kubelet[2488]: I1002 20:37:57.099351 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099433 kubelet[2488]: I1002 20:37:57.099424 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c3577b2eef501c0ad6394385f215979c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-96ab8c487b\" (UID: \"c3577b2eef501c0ad6394385f215979c\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099508 kubelet[2488]: I1002 20:37:57.099499 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099605 kubelet[2488]: I1002 20:37:57.099595 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099676 kubelet[2488]: I1002 20:37:57.099668 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e16160933961a3d6bb95dae966db723f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-96ab8c487b\" (UID: \"e16160933961a3d6bb95dae966db723f\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099753 kubelet[2488]: I1002 20:37:57.099744 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099822 kubelet[2488]: I1002 20:37:57.099813 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.099891 kubelet[2488]: I1002 20:37:57.099883 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4515d2d7a32327a4fd0ad19f19bb0584-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-96ab8c487b\" (UID: \"4515d2d7a32327a4fd0ad19f19bb0584\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" Oct 2 20:37:57.777982 kubelet[2488]: I1002 20:37:57.777939 2488 apiserver.go:52] "Watching apiserver" Oct 2 20:37:57.797657 kubelet[2488]: I1002 20:37:57.797620 2488 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 20:37:57.803897 kubelet[2488]: I1002 20:37:57.803854 2488 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:37:57.914328 kubelet[2488]: I1002 20:37:57.914300 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-96ab8c487b" podStartSLOduration=3.914245133 podCreationTimestamp="2023-10-02 20:37:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:37:57.899755152 +0000 UTC m=+1.215902437" watchObservedRunningTime="2023-10-02 20:37:57.914245133 +0000 UTC m=+1.230392418" Oct 2 20:37:57.949607 kubelet[2488]: I1002 20:37:57.949571 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-96ab8c487b" podStartSLOduration=1.949486743 podCreationTimestamp="2023-10-02 20:37:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:37:57.916215655 +0000 UTC m=+1.232362900" watchObservedRunningTime="2023-10-02 20:37:57.949486743 +0000 UTC m=+1.265634028" Oct 2 20:37:57.977558 kubelet[2488]: I1002 20:37:57.977472 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-96ab8c487b" podStartSLOduration=1.977437343 podCreationTimestamp="2023-10-02 20:37:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:37:57.950346504 +0000 UTC m=+1.266493789" watchObservedRunningTime="2023-10-02 20:37:57.977437343 +0000 UTC m=+1.293584628" Oct 2 20:38:01.926717 sudo[1720]: pam_unix(sudo:session): session closed for user root Oct 2 20:38:01.926000 audit[1720]: USER_END pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:01.932235 kernel: kauditd_printk_skb: 256 callbacks suppressed Oct 2 20:38:01.932327 kernel: audit: type=1106 audit(1696279081.926:955): pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:01.953902 kernel: audit: type=1104 audit(1696279081.926:956): pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:01.926000 audit[1720]: CRED_DISP pid=1720 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:38:02.026726 sshd[1717]: pam_unix(sshd:session): session closed for user core Oct 2 20:38:02.027000 audit[1717]: USER_END pid=1717 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:02.029634 systemd-logind[1339]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:38:02.030636 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:38:02.030828 systemd[1]: session-9.scope: Consumed 5.333s CPU time. Oct 2 20:38:02.031728 systemd-logind[1339]: Removed session 9. Oct 2 20:38:02.032166 systemd[1]: sshd@6-10.200.20.38:22-10.200.12.6:45186.service: Deactivated successfully. Oct 2 20:38:02.027000 audit[1717]: CRED_DISP pid=1717 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:02.075347 kernel: audit: type=1106 audit(1696279082.027:957): pid=1717 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:02.075421 kernel: audit: type=1104 audit(1696279082.027:958): pid=1717 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:38:02.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:02.097538 kernel: audit: type=1131 audit(1696279082.031:959): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:45186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:38:07.179000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.184000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.224138 kernel: audit: type=1400 audit(1696279087.179:960): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.224284 kernel: audit: type=1400 audit(1696279087.184:961): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.184000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c880 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.253302 kernel: audit: type=1300 audit(1696279087.184:961): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c880 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.279130 kernel: audit: type=1327 audit(1696279087.184:961): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.184000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.301410 kernel: audit: type=1400 audit(1696279087.184:962): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.184000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c8c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.331334 kernel: audit: type=1300 audit(1696279087.184:962): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c8c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.355807 kernel: audit: type=1327 audit(1696279087.184:962): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.184000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.184000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c900 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.408061 kernel: audit: type=1400 audit(1696279087.184:963): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:07.408150 kernel: audit: type=1300 audit(1696279087.184:963): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400084c900 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.435126 kernel: audit: type=1327 audit(1696279087.184:963): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:07.179000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400015f640 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:07.179000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:08.301000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 20:38:08.301000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000762ac0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:08.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:10.857360 kubelet[2488]: I1002 20:38:10.857324 2488 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 20:38:10.858029 env[1352]: time="2023-10-02T20:38:10.857939349Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:38:10.858259 kubelet[2488]: I1002 20:38:10.858120 2488 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 20:38:11.673600 kubelet[2488]: I1002 20:38:11.673553 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:11.677140 kubelet[2488]: W1002 20:38:11.677017 2488 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.0-a-96ab8c487b" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-96ab8c487b' and this object Oct 2 20:38:11.677140 kubelet[2488]: E1002 20:38:11.677064 2488 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.0-a-96ab8c487b" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-96ab8c487b' and this object Oct 2 20:38:11.678996 systemd[1]: Created slice kubepods-besteffort-pod7b3573fe_574c_4bcf_ab48_f4c24bf14e8f.slice. Oct 2 20:38:11.679316 kubelet[2488]: W1002 20:38:11.679284 2488 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-96ab8c487b" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-96ab8c487b' and this object Oct 2 20:38:11.679395 kubelet[2488]: E1002 20:38:11.679385 2488 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-96ab8c487b" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-96ab8c487b' and this object Oct 2 20:38:11.737735 kubelet[2488]: I1002 20:38:11.737688 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:11.742462 systemd[1]: Created slice kubepods-besteffort-poda77731df_b2cb_4813_99e4_efbcd2246958.slice. Oct 2 20:38:11.775730 kubelet[2488]: I1002 20:38:11.775693 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-87czk\" (UniqueName: \"kubernetes.io/projected/a77731df-b2cb-4813-99e4-efbcd2246958-kube-api-access-87czk\") pod \"tigera-operator-59c686f986-lsdzz\" (UID: \"a77731df-b2cb-4813-99e4-efbcd2246958\") " pod="tigera-operator/tigera-operator-59c686f986-lsdzz" Oct 2 20:38:11.775873 kubelet[2488]: I1002 20:38:11.775746 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t5lhq\" (UniqueName: \"kubernetes.io/projected/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-kube-api-access-t5lhq\") pod \"kube-proxy-2kwgh\" (UID: \"7b3573fe-574c-4bcf-ab48-f4c24bf14e8f\") " pod="kube-system/kube-proxy-2kwgh" Oct 2 20:38:11.775873 kubelet[2488]: I1002 20:38:11.775771 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-xtables-lock\") pod \"kube-proxy-2kwgh\" (UID: \"7b3573fe-574c-4bcf-ab48-f4c24bf14e8f\") " pod="kube-system/kube-proxy-2kwgh" Oct 2 20:38:11.775873 kubelet[2488]: I1002 20:38:11.775790 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-lib-modules\") pod \"kube-proxy-2kwgh\" (UID: \"7b3573fe-574c-4bcf-ab48-f4c24bf14e8f\") " pod="kube-system/kube-proxy-2kwgh" Oct 2 20:38:11.775873 kubelet[2488]: I1002 20:38:11.775819 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-kube-proxy\") pod \"kube-proxy-2kwgh\" (UID: \"7b3573fe-574c-4bcf-ab48-f4c24bf14e8f\") " pod="kube-system/kube-proxy-2kwgh" Oct 2 20:38:11.775873 kubelet[2488]: I1002 20:38:11.775845 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a77731df-b2cb-4813-99e4-efbcd2246958-var-lib-calico\") pod \"tigera-operator-59c686f986-lsdzz\" (UID: \"a77731df-b2cb-4813-99e4-efbcd2246958\") " pod="tigera-operator/tigera-operator-59c686f986-lsdzz" Oct 2 20:38:12.045662 env[1352]: time="2023-10-02T20:38:12.045491713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-lsdzz,Uid:a77731df-b2cb-4813-99e4-efbcd2246958,Namespace:tigera-operator,Attempt:0,}" Oct 2 20:38:12.080333 env[1352]: time="2023-10-02T20:38:12.080260668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:12.080488 env[1352]: time="2023-10-02T20:38:12.080345189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:12.080488 env[1352]: time="2023-10-02T20:38:12.080370029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:12.080787 env[1352]: time="2023-10-02T20:38:12.080731469Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165 pid=2568 runtime=io.containerd.runc.v2 Oct 2 20:38:12.096216 systemd[1]: Started cri-containerd-2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165.scope. Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.115000 audit: BPF prog-id=113 op=LOAD Oct 2 20:38:12.116000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.116000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303330323161643963626461393263653565363461653962636633 Oct 2 20:38:12.116000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.116000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303330323161643963626461393263653565363461653962636633 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit: BPF prog-id=114 op=LOAD Oct 2 20:38:12.117000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303330323161643963626461393263653565363461653962636633 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.117000 audit: BPF prog-id=115 op=LOAD Oct 2 20:38:12.117000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303330323161643963626461393263653565363461653962636633 Oct 2 20:38:12.118000 audit: BPF prog-id=115 op=UNLOAD Oct 2 20:38:12.118000 audit: BPF prog-id=114 op=UNLOAD Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:12.118000 audit: BPF prog-id=116 op=LOAD Oct 2 20:38:12.118000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:12.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303330323161643963626461393263653565363461653962636633 Oct 2 20:38:12.139299 env[1352]: time="2023-10-02T20:38:12.139249529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-lsdzz,Uid:a77731df-b2cb-4813-99e4-efbcd2246958,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165\"" Oct 2 20:38:12.143756 env[1352]: time="2023-10-02T20:38:12.143724933Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 20:38:12.888633 kubelet[2488]: E1002 20:38:12.888601 2488 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Oct 2 20:38:12.888996 kubelet[2488]: E1002 20:38:12.888982 2488 projected.go:198] Error preparing data for projected volume kube-api-access-t5lhq for pod kube-system/kube-proxy-2kwgh: failed to sync configmap cache: timed out waiting for the condition Oct 2 20:38:12.889127 kubelet[2488]: E1002 20:38:12.889115 2488 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-kube-api-access-t5lhq podName:7b3573fe-574c-4bcf-ab48-f4c24bf14e8f nodeName:}" failed. No retries permitted until 2023-10-02 20:38:13.389093337 +0000 UTC m=+16.705240622 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-t5lhq" (UniqueName: "kubernetes.io/projected/7b3573fe-574c-4bcf-ab48-f4c24bf14e8f-kube-api-access-t5lhq") pod "kube-proxy-2kwgh" (UID: "7b3573fe-574c-4bcf-ab48-f4c24bf14e8f") : failed to sync configmap cache: timed out waiting for the condition Oct 2 20:38:13.727427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1684256623.mount: Deactivated successfully. Oct 2 20:38:13.786305 env[1352]: time="2023-10-02T20:38:13.786268639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2kwgh,Uid:7b3573fe-574c-4bcf-ab48-f4c24bf14e8f,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:13.885404 env[1352]: time="2023-10-02T20:38:13.885340459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:13.885560 env[1352]: time="2023-10-02T20:38:13.885379539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:13.885560 env[1352]: time="2023-10-02T20:38:13.885389579Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:13.885641 env[1352]: time="2023-10-02T20:38:13.885565419Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc385db10727bfed4d7254ebcc5b086ed0ccb3e8e82cb6250fcec67add8ac608 pid=2610 runtime=io.containerd.runc.v2 Oct 2 20:38:13.902265 systemd[1]: Started cri-containerd-dc385db10727bfed4d7254ebcc5b086ed0ccb3e8e82cb6250fcec67add8ac608.scope. Oct 2 20:38:13.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925579 kernel: kauditd_printk_skb: 62 callbacks suppressed Oct 2 20:38:13.925688 kernel: audit: type=1400 audit(1696279093.918:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961600 kernel: audit: type=1400 audit(1696279093.918:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.982628 kernel: audit: type=1400 audit(1696279093.919:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.003070 kernel: audit: type=1400 audit(1696279093.919:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.042699 kernel: audit: type=1400 audit(1696279093.919:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.042845 kernel: audit: type=1400 audit(1696279093.919:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.061737 kernel: audit: type=1400 audit(1696279093.919:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.082159 kernel: audit: type=1400 audit(1696279093.919:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.102437 kernel: audit: type=1400 audit(1696279093.919:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.105613 env[1352]: time="2023-10-02T20:38:14.105572917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2kwgh,Uid:7b3573fe-574c-4bcf-ab48-f4c24bf14e8f,Namespace:kube-system,Attempt:0,} returns sandbox id \"dc385db10727bfed4d7254ebcc5b086ed0ccb3e8e82cb6250fcec67add8ac608\"" Oct 2 20:38:14.110671 env[1352]: time="2023-10-02T20:38:14.110641282Z" level=info msg="CreateContainer within sandbox \"dc385db10727bfed4d7254ebcc5b086ed0ccb3e8e82cb6250fcec67add8ac608\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:38:14.120790 kernel: audit: type=1400 audit(1696279093.919:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit: BPF prog-id=117 op=LOAD Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:13.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333835646231303732376266656434643732353465626363356230 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:13.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333835646231303732376266656434643732353465626363356230 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.919000 audit: BPF prog-id=118 op=LOAD Oct 2 20:38:13.919000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:13.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333835646231303732376266656434643732353465626363356230 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.925000 audit: BPF prog-id=119 op=LOAD Oct 2 20:38:13.925000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:13.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333835646231303732376266656434643732353465626363356230 Oct 2 20:38:13.961000 audit: BPF prog-id=119 op=UNLOAD Oct 2 20:38:13.961000 audit: BPF prog-id=118 op=UNLOAD Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:13.961000 audit: BPF prog-id=120 op=LOAD Oct 2 20:38:13.961000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:13.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333835646231303732376266656434643732353465626363356230 Oct 2 20:38:14.154356 env[1352]: time="2023-10-02T20:38:14.154305645Z" level=info msg="CreateContainer within sandbox \"dc385db10727bfed4d7254ebcc5b086ed0ccb3e8e82cb6250fcec67add8ac608\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2dbc5f492c9eb6e903204002a3cb55aa2750fc6e3d3cf229bb08b6de6fffcd00\"" Oct 2 20:38:14.157905 env[1352]: time="2023-10-02T20:38:14.157868329Z" level=info msg="StartContainer for \"2dbc5f492c9eb6e903204002a3cb55aa2750fc6e3d3cf229bb08b6de6fffcd00\"" Oct 2 20:38:14.180848 systemd[1]: Started cri-containerd-2dbc5f492c9eb6e903204002a3cb55aa2750fc6e3d3cf229bb08b6de6fffcd00.scope. Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2610 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626335663439326339656236653930333230343030326133636235 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.204000 audit: BPF prog-id=121 op=LOAD Oct 2 20:38:14.204000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2610 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626335663439326339656236653930333230343030326133636235 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.205000 audit: BPF prog-id=122 op=LOAD Oct 2 20:38:14.205000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2610 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626335663439326339656236653930333230343030326133636235 Oct 2 20:38:14.206000 audit: BPF prog-id=122 op=UNLOAD Oct 2 20:38:14.206000 audit: BPF prog-id=121 op=UNLOAD Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.206000 audit: BPF prog-id=123 op=LOAD Oct 2 20:38:14.206000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2610 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626335663439326339656236653930333230343030326133636235 Oct 2 20:38:14.225305 env[1352]: time="2023-10-02T20:38:14.225251515Z" level=info msg="StartContainer for \"2dbc5f492c9eb6e903204002a3cb55aa2750fc6e3d3cf229bb08b6de6fffcd00\" returns successfully" Oct 2 20:38:14.315000 audit[2701]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.315000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5e99390 a2=0 a3=ffffb2b6a6c0 items=0 ppid=2661 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:14.333000 audit[2702]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.333000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1880420 a2=0 a3=ffff878bb6c0 items=0 ppid=2661 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:14.342000 audit[2703]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.342000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd13c02a0 a2=0 a3=ffff87b4e6c0 items=0 ppid=2661 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:38:14.345000 audit[2704]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.345000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc37693d0 a2=0 a3=ffff8d0b16c0 items=0 ppid=2661 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:38:14.350000 audit[2705]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.350000 audit[2705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7ff5f70 a2=0 a3=ffff9c1f16c0 items=0 ppid=2661 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:14.352000 audit[2706]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.352000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6e33f50 a2=0 a3=ffffbbcb96c0 items=0 ppid=2661 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:38:14.419000 audit[2707]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.419000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd683b150 a2=0 a3=ffff926796c0 items=0 ppid=2661 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:14.423000 audit[2709]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.423000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff2c846b0 a2=0 a3=ffff9c6676c0 items=0 ppid=2661 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:38:14.428000 audit[2712]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.428000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff06b24b0 a2=0 a3=ffff87ff76c0 items=0 ppid=2661 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:38:14.429000 audit[2713]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.429000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc098860 a2=0 a3=ffffb3aca6c0 items=0 ppid=2661 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:14.432000 audit[2715]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.432000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff46716f0 a2=0 a3=ffff8754e6c0 items=0 ppid=2661 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:14.434000 audit[2716]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.434000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbe11a50 a2=0 a3=ffffbd09d6c0 items=0 ppid=2661 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:14.437000 audit[2718]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.437000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc340b650 a2=0 a3=ffff9ef9b6c0 items=0 ppid=2661 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:14.442000 audit[2721]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.442000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcfe76450 a2=0 a3=ffffb58206c0 items=0 ppid=2661 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:38:14.443000 audit[2722]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.443000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2a0fad0 a2=0 a3=ffff970c26c0 items=0 ppid=2661 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:14.446000 audit[2724]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.446000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcdfef480 a2=0 a3=ffff981696c0 items=0 ppid=2661 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:14.448000 audit[2725]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.448000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff40ea020 a2=0 a3=ffff892946c0 items=0 ppid=2661 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:14.451000 audit[2727]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.451000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe971e4b0 a2=0 a3=ffff85aaf6c0 items=0 ppid=2661 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.456000 audit[2730]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.456000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffee3de30 a2=0 a3=ffff8c9f06c0 items=0 ppid=2661 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.462000 audit[2733]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.462000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4ca1100 a2=0 a3=ffff8de0a6c0 items=0 ppid=2661 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:14.464000 audit[2734]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.464000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffed291310 a2=0 a3=ffff8aa006c0 items=0 ppid=2661 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:14.467000 audit[2736]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.467000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff275f250 a2=0 a3=ffffb02df6c0 items=0 ppid=2661 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.471000 audit[2739]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.471000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec32e8b0 a2=0 a3=ffffa907b6c0 items=0 ppid=2661 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.481000 audit[2744]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.481000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd12308a0 a2=0 a3=ffffb4a0c6c0 items=0 ppid=2661 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:38:14.484000 audit[2746]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:38:14.484000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffcdecd130 a2=0 a3=ffffbbb6e6c0 items=0 ppid=2661 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:38:14.537000 audit[2748]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:14.537000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffeb8ed110 a2=0 a3=ffff841356c0 items=0 ppid=2661 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.567000 audit[2748]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:14.567000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffeb8ed110 a2=0 a3=ffff841356c0 items=0 ppid=2661 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.571000 audit[2753]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.571000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffff00be30 a2=0 a3=ffff9d2616c0 items=0 ppid=2661 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:38:14.576000 audit[2755]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.576000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc8d64260 a2=0 a3=ffffbc8d36c0 items=0 ppid=2661 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:38:14.581000 audit[2758]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.581000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdaa63eb0 a2=0 a3=ffff85ddf6c0 items=0 ppid=2661 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:38:14.582000 audit[2759]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.582000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe59abac0 a2=0 a3=ffffaf1be6c0 items=0 ppid=2661 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:38:14.586000 audit[2761]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.586000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe0cb05c0 a2=0 a3=ffff9c52a6c0 items=0 ppid=2661 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:38:14.587000 audit[2762]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.587000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff29f0fe0 a2=0 a3=ffffb0b766c0 items=0 ppid=2661 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:38:14.591000 audit[2764]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.591000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe34efdf0 a2=0 a3=ffff837a26c0 items=0 ppid=2661 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:38:14.596000 audit[2767]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.596000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe3d0b620 a2=0 a3=ffff980256c0 items=0 ppid=2661 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:38:14.597000 audit[2768]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.597000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfa508a0 a2=0 a3=ffff901536c0 items=0 ppid=2661 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:38:14.601000 audit[2770]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.601000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8bed310 a2=0 a3=ffffbd0d16c0 items=0 ppid=2661 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:38:14.603000 audit[2771]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.603000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea08e810 a2=0 a3=ffff94b856c0 items=0 ppid=2661 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:38:14.606000 audit[2773]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.606000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffa452710 a2=0 a3=ffff84bd46c0 items=0 ppid=2661 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:38:14.611000 audit[2776]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.611000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbd97a60 a2=0 a3=ffff8ed026c0 items=0 ppid=2661 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:38:14.616000 audit[2779]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.616000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd078a330 a2=0 a3=ffffb97526c0 items=0 ppid=2661 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:38:14.617000 audit[2780]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.617000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec508cd0 a2=0 a3=ffff8e9ba6c0 items=0 ppid=2661 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:38:14.621000 audit[2782]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.621000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcf89ca10 a2=0 a3=ffffbe4c66c0 items=0 ppid=2661 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.625000 audit[2785]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.625000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe8aa6f30 a2=0 a3=ffffaf8a26c0 items=0 ppid=2661 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:38:14.626000 audit[2786]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.626000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6f46960 a2=0 a3=ffffa7f0f6c0 items=0 ppid=2661 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:38:14.629000 audit[2788]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.629000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde74e940 a2=0 a3=ffffac8d36c0 items=0 ppid=2661 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:38:14.634000 audit[2791]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.634000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3f0ae20 a2=0 a3=ffff878a96c0 items=0 ppid=2661 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:38:14.635000 audit[2792]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.635000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8c7d0b0 a2=0 a3=ffffb92666c0 items=0 ppid=2661 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:38:14.638000 audit[2794]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:38:14.638000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd1ccf4d0 a2=0 a3=ffffb77406c0 items=0 ppid=2661 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:38:14.642000 audit[2796]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:14.642000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd3f8b0e0 a2=0 a3=ffffac6b16c0 items=0 ppid=2661 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.642000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.642000 audit[2796]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:38:14.642000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffd3f8b0e0 a2=0 a3=ffffac6b16c0 items=0 ppid=2661 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.642000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:14.755970 env[1352]: time="2023-10-02T20:38:14.755929837Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.763106 env[1352]: time="2023-10-02T20:38:14.763070044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.767614 env[1352]: time="2023-10-02T20:38:14.767580648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.772036 env[1352]: time="2023-10-02T20:38:14.772003772Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:14.772626 env[1352]: time="2023-10-02T20:38:14.772595493Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 20:38:14.776659 env[1352]: time="2023-10-02T20:38:14.776632977Z" level=info msg="CreateContainer within sandbox \"2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 20:38:14.802173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1867410036.mount: Deactivated successfully. Oct 2 20:38:14.805253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1529672803.mount: Deactivated successfully. Oct 2 20:38:14.815594 env[1352]: time="2023-10-02T20:38:14.815551215Z" level=info msg="CreateContainer within sandbox \"2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344\"" Oct 2 20:38:14.818339 env[1352]: time="2023-10-02T20:38:14.816345736Z" level=info msg="StartContainer for \"37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344\"" Oct 2 20:38:14.836621 systemd[1]: Started cri-containerd-37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344.scope. Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.853000 audit: BPF prog-id=124 op=LOAD Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2568 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303433663538373265626131303734663132613838333839633563 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2568 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303433663538373265626131303734663132613838333839633563 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit: BPF prog-id=125 op=LOAD Oct 2 20:38:14.854000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2568 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303433663538373265626131303734663132613838333839633563 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit: BPF prog-id=126 op=LOAD Oct 2 20:38:14.854000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2568 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303433663538373265626131303734663132613838333839633563 Oct 2 20:38:14.854000 audit: BPF prog-id=126 op=UNLOAD Oct 2 20:38:14.854000 audit: BPF prog-id=125 op=UNLOAD Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:14.854000 audit: BPF prog-id=127 op=LOAD Oct 2 20:38:14.854000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2568 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:14.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303433663538373265626131303734663132613838333839633563 Oct 2 20:38:14.877701 env[1352]: time="2023-10-02T20:38:14.877655356Z" level=info msg="StartContainer for \"37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344\" returns successfully" Oct 2 20:38:14.928409 kubelet[2488]: I1002 20:38:14.928370 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-lsdzz" podStartSLOduration=1.296106843 podCreationTimestamp="2023-10-02 20:38:11 +0000 UTC" firstStartedPulling="2023-10-02 20:38:12.14075033 +0000 UTC m=+15.456897615" lastFinishedPulling="2023-10-02 20:38:14.772977693 +0000 UTC m=+18.089124938" observedRunningTime="2023-10-02 20:38:14.915876474 +0000 UTC m=+18.232023759" watchObservedRunningTime="2023-10-02 20:38:14.928334166 +0000 UTC m=+18.244481451" Oct 2 20:38:18.171000 audit[2840]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.171000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdee97980 a2=0 a3=ffff8f37f6c0 items=0 ppid=2661 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.172000 audit[2840]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.172000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdee97980 a2=0 a3=ffff8f37f6c0 items=0 ppid=2661 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.180000 audit[2842]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.180000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff6d612f0 a2=0 a3=ffff919b76c0 items=0 ppid=2661 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.181000 audit[2842]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:18.181000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff6d612f0 a2=0 a3=ffff919b76c0 items=0 ppid=2661 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:18.402679 kubelet[2488]: I1002 20:38:18.402651 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2kwgh" podStartSLOduration=7.402599314 podCreationTimestamp="2023-10-02 20:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:14.929230527 +0000 UTC m=+18.245377812" watchObservedRunningTime="2023-10-02 20:38:18.402599314 +0000 UTC m=+21.718746599" Oct 2 20:38:18.403267 kubelet[2488]: I1002 20:38:18.403251 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:18.408148 systemd[1]: Created slice kubepods-besteffort-podf19ec769_d641_4f95_9930_309e9600e878.slice. Oct 2 20:38:18.425446 kubelet[2488]: I1002 20:38:18.425342 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f19ec769-d641-4f95-9930-309e9600e878-typha-certs\") pod \"calico-typha-bbc69446f-t4sjn\" (UID: \"f19ec769-d641-4f95-9930-309e9600e878\") " pod="calico-system/calico-typha-bbc69446f-t4sjn" Oct 2 20:38:18.425726 kubelet[2488]: I1002 20:38:18.425711 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tng66\" (UniqueName: \"kubernetes.io/projected/f19ec769-d641-4f95-9930-309e9600e878-kube-api-access-tng66\") pod \"calico-typha-bbc69446f-t4sjn\" (UID: \"f19ec769-d641-4f95-9930-309e9600e878\") " pod="calico-system/calico-typha-bbc69446f-t4sjn" Oct 2 20:38:18.425832 kubelet[2488]: I1002 20:38:18.425822 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f19ec769-d641-4f95-9930-309e9600e878-tigera-ca-bundle\") pod \"calico-typha-bbc69446f-t4sjn\" (UID: \"f19ec769-d641-4f95-9930-309e9600e878\") " pod="calico-system/calico-typha-bbc69446f-t4sjn" Oct 2 20:38:18.456485 kubelet[2488]: I1002 20:38:18.456410 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:18.461112 systemd[1]: Created slice kubepods-besteffort-pod5fc2b8c6_d5a2_40a4_954e_8a9c5e241cbe.slice. Oct 2 20:38:18.527004 kubelet[2488]: I1002 20:38:18.526967 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-var-run-calico\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.527261 kubelet[2488]: I1002 20:38:18.527226 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-cni-bin-dir\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.527363 kubelet[2488]: I1002 20:38:18.527354 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-lib-modules\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.527466 kubelet[2488]: I1002 20:38:18.527457 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-cni-log-dir\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.527609 kubelet[2488]: I1002 20:38:18.527598 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-xtables-lock\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.528023 kubelet[2488]: I1002 20:38:18.528009 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-node-certs\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.528247 kubelet[2488]: I1002 20:38:18.528212 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f79dd\" (UniqueName: \"kubernetes.io/projected/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-kube-api-access-f79dd\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.528364 kubelet[2488]: I1002 20:38:18.528353 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-tigera-ca-bundle\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.528788 kubelet[2488]: I1002 20:38:18.528761 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-cni-net-dir\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.528985 kubelet[2488]: I1002 20:38:18.528825 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-flexvol-driver-host\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.529137 kubelet[2488]: I1002 20:38:18.529121 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-var-lib-calico\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.529215 kubelet[2488]: I1002 20:38:18.529199 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe-policysync\") pod \"calico-node-jmrs9\" (UID: \"5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe\") " pod="calico-system/calico-node-jmrs9" Oct 2 20:38:18.640016 kubelet[2488]: E1002 20:38:18.639983 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:18.640016 kubelet[2488]: W1002 20:38:18.640006 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:18.640174 kubelet[2488]: E1002 20:38:18.640027 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.651755 kubelet[2488]: E1002 20:38:18.651727 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:18.651755 kubelet[2488]: W1002 20:38:18.651746 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:18.651903 kubelet[2488]: E1002 20:38:18.651768 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:18.711164 env[1352]: time="2023-10-02T20:38:18.710727634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bbc69446f-t4sjn,Uid:f19ec769-d641-4f95-9930-309e9600e878,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:18.751992 env[1352]: time="2023-10-02T20:38:18.751608991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:18.751992 env[1352]: time="2023-10-02T20:38:18.751648671Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:18.751992 env[1352]: time="2023-10-02T20:38:18.751658671Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:18.751992 env[1352]: time="2023-10-02T20:38:18.751918991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/823fa41d84f1b29d86b911613c000ecdd4f4fb660f2c916a35436789884e6e8c pid=2856 runtime=io.containerd.runc.v2 Oct 2 20:38:18.764486 env[1352]: time="2023-10-02T20:38:18.764433202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jmrs9,Uid:5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:18.766777 systemd[1]: Started cri-containerd-823fa41d84f1b29d86b911613c000ecdd4f4fb660f2c916a35436789884e6e8c.scope. Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.786000 audit: BPF prog-id=128 op=LOAD Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832336661343164383466316232396438366239313136313363303030 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832336661343164383466316232396438366239313136313363303030 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit: BPF prog-id=129 op=LOAD Oct 2 20:38:18.787000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832336661343164383466316232396438366239313136313363303030 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit: BPF prog-id=130 op=LOAD Oct 2 20:38:18.787000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832336661343164383466316232396438366239313136313363303030 Oct 2 20:38:18.787000 audit: BPF prog-id=130 op=UNLOAD Oct 2 20:38:18.787000 audit: BPF prog-id=129 op=UNLOAD Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.787000 audit: BPF prog-id=131 op=LOAD Oct 2 20:38:18.787000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832336661343164383466316232396438366239313136313363303030 Oct 2 20:38:18.813916 env[1352]: time="2023-10-02T20:38:18.813618607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:18.813916 env[1352]: time="2023-10-02T20:38:18.813656007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:18.813916 env[1352]: time="2023-10-02T20:38:18.813665647Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:18.814267 env[1352]: time="2023-10-02T20:38:18.814193168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac pid=2894 runtime=io.containerd.runc.v2 Oct 2 20:38:18.834317 env[1352]: time="2023-10-02T20:38:18.834265306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bbc69446f-t4sjn,Uid:f19ec769-d641-4f95-9930-309e9600e878,Namespace:calico-system,Attempt:0,} returns sandbox id \"823fa41d84f1b29d86b911613c000ecdd4f4fb660f2c916a35436789884e6e8c\"" Oct 2 20:38:18.837722 env[1352]: time="2023-10-02T20:38:18.837599229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 20:38:18.854598 systemd[1]: Started cri-containerd-0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac.scope. Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.877000 audit: BPF prog-id=132 op=LOAD Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2894 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034303564643036616163353736313136613031323839373638373832 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2894 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034303564643036616163353736313136613031323839373638373832 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit: BPF prog-id=133 op=LOAD Oct 2 20:38:18.878000 audit[2902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2894 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034303564643036616163353736313136613031323839373638373832 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit: BPF prog-id=134 op=LOAD Oct 2 20:38:18.878000 audit[2902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2894 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034303564643036616163353736313136613031323839373638373832 Oct 2 20:38:18.878000 audit: BPF prog-id=134 op=UNLOAD Oct 2 20:38:18.878000 audit: BPF prog-id=133 op=UNLOAD Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:18.878000 audit: BPF prog-id=135 op=LOAD Oct 2 20:38:18.878000 audit[2902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2894 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:18.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034303564643036616163353736313136613031323839373638373832 Oct 2 20:38:18.896991 env[1352]: time="2023-10-02T20:38:18.896936643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jmrs9,Uid:5fc2b8c6-d5a2-40a4-954e-8a9c5e241cbe,Namespace:calico-system,Attempt:0,} returns sandbox id \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\"" Oct 2 20:38:19.192000 audit[2928]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:19.197979 kernel: kauditd_printk_skb: 426 callbacks suppressed Oct 2 20:38:19.198052 kernel: audit: type=1325 audit(1696279099.192:1116): table=filter:96 family=2 entries=16 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:19.192000 audit[2928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe3390790 a2=0 a3=ffff8b82b6c0 items=0 ppid=2661 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:19.240159 kernel: audit: type=1300 audit(1696279099.192:1116): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe3390790 a2=0 a3=ffff8b82b6c0 items=0 ppid=2661 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:19.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:19.253984 kernel: audit: type=1327 audit(1696279099.192:1116): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:19.192000 audit[2928]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:19.268112 kernel: audit: type=1325 audit(1696279099.192:1117): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:19.268213 kernel: audit: type=1300 audit(1696279099.192:1117): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe3390790 a2=0 a3=ffff8b82b6c0 items=0 ppid=2661 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:19.192000 audit[2928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe3390790 a2=0 a3=ffff8b82b6c0 items=0 ppid=2661 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:19.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:19.310184 kernel: audit: type=1327 audit(1696279099.192:1117): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:19.976265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167616098.mount: Deactivated successfully. Oct 2 20:38:20.735025 env[1352]: time="2023-10-02T20:38:20.734982508Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.745580 env[1352]: time="2023-10-02T20:38:20.745502557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.754345 env[1352]: time="2023-10-02T20:38:20.754308925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.764234 env[1352]: time="2023-10-02T20:38:20.764203614Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:20.764661 env[1352]: time="2023-10-02T20:38:20.764630814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 20:38:20.766873 env[1352]: time="2023-10-02T20:38:20.765509015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:38:20.767171 env[1352]: time="2023-10-02T20:38:20.767028936Z" level=info msg="CreateContainer within sandbox \"823fa41d84f1b29d86b911613c000ecdd4f4fb660f2c916a35436789884e6e8c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 20:38:20.791128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2807330466.mount: Deactivated successfully. Oct 2 20:38:20.794507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1201940972.mount: Deactivated successfully. Oct 2 20:38:20.805221 env[1352]: time="2023-10-02T20:38:20.805179849Z" level=info msg="CreateContainer within sandbox \"823fa41d84f1b29d86b911613c000ecdd4f4fb660f2c916a35436789884e6e8c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f3dc7045cb8dc9cbaf8e6f776149c475011df8f3f8f94e109332a3576bdcb8d1\"" Oct 2 20:38:20.806030 env[1352]: time="2023-10-02T20:38:20.806002450Z" level=info msg="StartContainer for \"f3dc7045cb8dc9cbaf8e6f776149c475011df8f3f8f94e109332a3576bdcb8d1\"" Oct 2 20:38:20.828963 systemd[1]: Started cri-containerd-f3dc7045cb8dc9cbaf8e6f776149c475011df8f3f8f94e109332a3576bdcb8d1.scope. Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.866593 kernel: audit: type=1400 audit(1696279100.844:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.903902 kernel: audit: type=1400 audit(1696279100.844:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.903991 kernel: audit: type=1400 audit(1696279100.844:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.922339 kernel: audit: type=1400 audit(1696279100.844:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit: BPF prog-id=136 op=LOAD Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2856 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646337303435636238646339636261663865366637373631343963 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2856 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646337303435636238646339636261663865366637373631343963 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit: BPF prog-id=137 op=LOAD Oct 2 20:38:20.862000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2856 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646337303435636238646339636261663865366637373631343963 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit: BPF prog-id=138 op=LOAD Oct 2 20:38:20.862000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2856 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646337303435636238646339636261663865366637373631343963 Oct 2 20:38:20.862000 audit: BPF prog-id=138 op=UNLOAD Oct 2 20:38:20.862000 audit: BPF prog-id=137 op=UNLOAD Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:20.862000 audit: BPF prog-id=139 op=LOAD Oct 2 20:38:20.862000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2856 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:20.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633646337303435636238646339636261663865366637373631343963 Oct 2 20:38:20.940451 env[1352]: time="2023-10-02T20:38:20.940397647Z" level=info msg="StartContainer for \"f3dc7045cb8dc9cbaf8e6f776149c475011df8f3f8f94e109332a3576bdcb8d1\" returns successfully" Oct 2 20:38:21.939983 kubelet[2488]: I1002 20:38:21.939945 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-bbc69446f-t4sjn" podStartSLOduration=2.010668998 podCreationTimestamp="2023-10-02 20:38:18 +0000 UTC" firstStartedPulling="2023-10-02 20:38:18.835695387 +0000 UTC m=+22.151842672" lastFinishedPulling="2023-10-02 20:38:20.764937574 +0000 UTC m=+24.081084859" observedRunningTime="2023-10-02 20:38:21.938802144 +0000 UTC m=+25.254949429" watchObservedRunningTime="2023-10-02 20:38:21.939911185 +0000 UTC m=+25.256058430" Oct 2 20:38:21.963000 audit[2969]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:21.963000 audit[2969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff20e7d40 a2=0 a3=ffff972396c0 items=0 ppid=2661 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:21.964000 audit[2969]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:21.964000 audit[2969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=fffff20e7d40 a2=0 a3=ffff972396c0 items=0 ppid=2661 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:21.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:22.027087 kubelet[2488]: E1002 20:38:22.027053 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.027087 kubelet[2488]: W1002 20:38:22.027077 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.027257 kubelet[2488]: E1002 20:38:22.027101 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.027257 kubelet[2488]: E1002 20:38:22.027254 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.027308 kubelet[2488]: W1002 20:38:22.027261 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.027308 kubelet[2488]: E1002 20:38:22.027272 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.027405 kubelet[2488]: E1002 20:38:22.027384 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.027405 kubelet[2488]: W1002 20:38:22.027399 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.027473 kubelet[2488]: E1002 20:38:22.027410 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.027654 kubelet[2488]: E1002 20:38:22.027634 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.027654 kubelet[2488]: W1002 20:38:22.027652 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.027747 kubelet[2488]: E1002 20:38:22.027665 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.027819 kubelet[2488]: E1002 20:38:22.027800 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.027819 kubelet[2488]: W1002 20:38:22.027813 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.027887 kubelet[2488]: E1002 20:38:22.027824 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.028035 kubelet[2488]: E1002 20:38:22.028014 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.028035 kubelet[2488]: W1002 20:38:22.028029 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.028119 kubelet[2488]: E1002 20:38:22.028043 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.028247 kubelet[2488]: E1002 20:38:22.028228 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.028247 kubelet[2488]: W1002 20:38:22.028241 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.028325 kubelet[2488]: E1002 20:38:22.028252 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.028476 kubelet[2488]: E1002 20:38:22.028457 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.028476 kubelet[2488]: W1002 20:38:22.028471 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.028625 kubelet[2488]: E1002 20:38:22.028482 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.028656 kubelet[2488]: E1002 20:38:22.028635 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.028656 kubelet[2488]: W1002 20:38:22.028643 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.028656 kubelet[2488]: E1002 20:38:22.028655 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.028860 kubelet[2488]: E1002 20:38:22.028842 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.028860 kubelet[2488]: W1002 20:38:22.028856 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.028945 kubelet[2488]: E1002 20:38:22.028867 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.029006 kubelet[2488]: E1002 20:38:22.028988 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.029006 kubelet[2488]: W1002 20:38:22.029001 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.029073 kubelet[2488]: E1002 20:38:22.029013 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.029219 kubelet[2488]: E1002 20:38:22.029200 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.029219 kubelet[2488]: W1002 20:38:22.029215 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.029309 kubelet[2488]: E1002 20:38:22.029228 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.046766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3642801437.mount: Deactivated successfully. Oct 2 20:38:22.048618 kubelet[2488]: E1002 20:38:22.048594 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.048618 kubelet[2488]: W1002 20:38:22.048615 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.048745 kubelet[2488]: E1002 20:38:22.048636 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.048997 kubelet[2488]: E1002 20:38:22.048943 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.048997 kubelet[2488]: W1002 20:38:22.048956 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.048997 kubelet[2488]: E1002 20:38:22.048973 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.049249 kubelet[2488]: E1002 20:38:22.049230 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.049249 kubelet[2488]: W1002 20:38:22.049245 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.049335 kubelet[2488]: E1002 20:38:22.049262 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.049535 kubelet[2488]: E1002 20:38:22.049502 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.049591 kubelet[2488]: W1002 20:38:22.049518 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.049591 kubelet[2488]: E1002 20:38:22.049567 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.049803 kubelet[2488]: E1002 20:38:22.049774 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.049803 kubelet[2488]: W1002 20:38:22.049786 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.049803 kubelet[2488]: E1002 20:38:22.049801 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.050038 kubelet[2488]: E1002 20:38:22.050021 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.050038 kubelet[2488]: W1002 20:38:22.050037 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.050266 kubelet[2488]: E1002 20:38:22.050151 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.050353 kubelet[2488]: E1002 20:38:22.050296 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.050353 kubelet[2488]: W1002 20:38:22.050304 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.050624 kubelet[2488]: E1002 20:38:22.050371 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.050624 kubelet[2488]: E1002 20:38:22.050559 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.050624 kubelet[2488]: W1002 20:38:22.050569 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.050844 kubelet[2488]: E1002 20:38:22.050730 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.050908 kubelet[2488]: E1002 20:38:22.050862 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.050908 kubelet[2488]: W1002 20:38:22.050871 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.050908 kubelet[2488]: E1002 20:38:22.050886 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.051235 kubelet[2488]: E1002 20:38:22.051216 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.051235 kubelet[2488]: W1002 20:38:22.051231 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.051313 kubelet[2488]: E1002 20:38:22.051249 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.051460 kubelet[2488]: E1002 20:38:22.051444 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.051460 kubelet[2488]: W1002 20:38:22.051457 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.051719 kubelet[2488]: E1002 20:38:22.051472 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.051719 kubelet[2488]: E1002 20:38:22.051703 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.051719 kubelet[2488]: W1002 20:38:22.051712 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.051719 kubelet[2488]: E1002 20:38:22.051730 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.051978 kubelet[2488]: E1002 20:38:22.051960 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.051978 kubelet[2488]: W1002 20:38:22.051974 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.052059 kubelet[2488]: E1002 20:38:22.052047 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.052354 kubelet[2488]: E1002 20:38:22.052321 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.052354 kubelet[2488]: W1002 20:38:22.052337 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.052354 kubelet[2488]: E1002 20:38:22.052355 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.052783 kubelet[2488]: E1002 20:38:22.052764 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.052783 kubelet[2488]: W1002 20:38:22.052779 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.052885 kubelet[2488]: E1002 20:38:22.052799 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.053039 kubelet[2488]: E1002 20:38:22.053017 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.053039 kubelet[2488]: W1002 20:38:22.053032 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.053455 kubelet[2488]: E1002 20:38:22.053050 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.053455 kubelet[2488]: E1002 20:38:22.053237 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.053455 kubelet[2488]: W1002 20:38:22.053249 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.053455 kubelet[2488]: E1002 20:38:22.053271 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.053676 kubelet[2488]: E1002 20:38:22.053630 2488 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:38:22.053676 kubelet[2488]: W1002 20:38:22.053643 2488 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:38:22.053676 kubelet[2488]: E1002 20:38:22.053656 2488 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:38:22.229571 env[1352]: time="2023-10-02T20:38:22.227775748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.236603 env[1352]: time="2023-10-02T20:38:22.235974755Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.240999 env[1352]: time="2023-10-02T20:38:22.240962279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.245511 env[1352]: time="2023-10-02T20:38:22.245473123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:22.246092 env[1352]: time="2023-10-02T20:38:22.246058323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 20:38:22.249360 env[1352]: time="2023-10-02T20:38:22.249257566Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:38:22.274874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2843906315.mount: Deactivated successfully. Oct 2 20:38:22.290002 env[1352]: time="2023-10-02T20:38:22.289956800Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a\"" Oct 2 20:38:22.292385 env[1352]: time="2023-10-02T20:38:22.290895921Z" level=info msg="StartContainer for \"2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a\"" Oct 2 20:38:22.311223 systemd[1]: Started cri-containerd-2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a.scope. Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2894 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:22.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363963333330316234303064326433656266643032653837626337 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit: BPF prog-id=140 op=LOAD Oct 2 20:38:22.333000 audit[3007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2894 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:22.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363963333330316234303064326433656266643032653837626337 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit: BPF prog-id=141 op=LOAD Oct 2 20:38:22.333000 audit[3007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2894 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:22.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363963333330316234303064326433656266643032653837626337 Oct 2 20:38:22.333000 audit: BPF prog-id=141 op=UNLOAD Oct 2 20:38:22.333000 audit: BPF prog-id=140 op=UNLOAD Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:22.333000 audit: BPF prog-id=142 op=LOAD Oct 2 20:38:22.333000 audit[3007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2894 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:22.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238363963333330316234303064326433656266643032653837626337 Oct 2 20:38:22.359715 systemd[1]: cri-containerd-2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a.scope: Deactivated successfully. Oct 2 20:38:22.360743 env[1352]: time="2023-10-02T20:38:22.360674340Z" level=info msg="StartContainer for \"2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a\" returns successfully" Oct 2 20:38:22.363000 audit: BPF prog-id=142 op=UNLOAD Oct 2 20:38:23.241597 env[1352]: time="2023-10-02T20:38:23.241420397Z" level=info msg="shim disconnected" id=2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a Oct 2 20:38:23.241597 env[1352]: time="2023-10-02T20:38:23.241461197Z" level=warning msg="cleaning up after shim disconnected" id=2869c3301b400d2d3ebfd02e87bc7693b60ce143e25115e5bb4ffa18a3da4c8a namespace=k8s.io Oct 2 20:38:23.241597 env[1352]: time="2023-10-02T20:38:23.241471517Z" level=info msg="cleaning up dead shim" Oct 2 20:38:23.253959 env[1352]: time="2023-10-02T20:38:23.253913847Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3051 runtime=io.containerd.runc.v2\n" Oct 2 20:38:23.936879 env[1352]: time="2023-10-02T20:38:23.936830371Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:38:25.032876 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3392163051.mount: Deactivated successfully. Oct 2 20:38:28.049050 env[1352]: time="2023-10-02T20:38:28.048995420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.054137 env[1352]: time="2023-10-02T20:38:28.054095943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.057807 env[1352]: time="2023-10-02T20:38:28.057768066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.061137 env[1352]: time="2023-10-02T20:38:28.061102949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:28.061755 env[1352]: time="2023-10-02T20:38:28.061724869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 20:38:28.065633 env[1352]: time="2023-10-02T20:38:28.065598912Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:38:28.089207 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1036979533.mount: Deactivated successfully. Oct 2 20:38:28.094474 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453577335.mount: Deactivated successfully. Oct 2 20:38:28.109163 env[1352]: time="2023-10-02T20:38:28.109090305Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f\"" Oct 2 20:38:28.109862 env[1352]: time="2023-10-02T20:38:28.109839226Z" level=info msg="StartContainer for \"2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f\"" Oct 2 20:38:28.140470 systemd[1]: Started cri-containerd-2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f.scope. Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167780 kernel: kauditd_printk_skb: 103 callbacks suppressed Oct 2 20:38:28.167851 kernel: audit: type=1400 audit(1696279108.162:1145): avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2894 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.213634 kernel: audit: type=1300 audit(1696279108.162:1145): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2894 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633839313663663061623733386439643664623433393531363431 Oct 2 20:38:28.238850 kernel: audit: type=1327 audit(1696279108.162:1145): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633839313663663061623733386439643664623433393531363431 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.259590 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.280499 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.301534 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.320500 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.338785 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.341080 env[1352]: time="2023-10-02T20:38:28.341042640Z" level=info msg="StartContainer for \"2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f\" returns successfully" Oct 2 20:38:28.357273 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.375560 kernel: audit: type=1400 audit(1696279108.162:1146): avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.162000 audit: BPF prog-id=143 op=LOAD Oct 2 20:38:28.162000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2894 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633839313663663061623733386439643664623433393531363431 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.167000 audit: BPF prog-id=144 op=LOAD Oct 2 20:38:28.167000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2894 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633839313663663061623733386439643664623433393531363431 Oct 2 20:38:28.185000 audit: BPF prog-id=144 op=UNLOAD Oct 2 20:38:28.185000 audit: BPF prog-id=143 op=UNLOAD Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:28.185000 audit: BPF prog-id=145 op=LOAD Oct 2 20:38:28.185000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2894 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:28.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633839313663663061623733386439643664623433393531363431 Oct 2 20:38:29.547210 env[1352]: time="2023-10-02T20:38:29.547144985Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:38:29.549730 systemd[1]: cri-containerd-2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f.scope: Deactivated successfully. Oct 2 20:38:29.552000 audit: BPF prog-id=145 op=UNLOAD Oct 2 20:38:29.568404 kubelet[2488]: I1002 20:38:29.568358 2488 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 20:38:29.578628 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f-rootfs.mount: Deactivated successfully. Oct 2 20:38:29.597551 kubelet[2488]: I1002 20:38:29.597487 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.604154 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.604309 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.611901 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xk6xk\" (UniqueName: \"kubernetes.io/projected/19346e89-5378-4f48-a994-157b505e679d-kube-api-access-xk6xk\") pod \"coredns-5d78c9869d-whh7w\" (UID: \"19346e89-5378-4f48-a994-157b505e679d\") " pod="kube-system/coredns-5d78c9869d-whh7w" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.611937 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/19346e89-5378-4f48-a994-157b505e679d-config-volume\") pod \"coredns-5d78c9869d-whh7w\" (UID: \"19346e89-5378-4f48-a994-157b505e679d\") " pod="kube-system/coredns-5d78c9869d-whh7w" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.611981 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mkrxf\" (UniqueName: \"kubernetes.io/projected/9e59910b-3872-4ac4-99cf-4b35292d9dd2-kube-api-access-mkrxf\") pod \"calico-kube-controllers-7bd445fdb4-v9p4h\" (UID: \"9e59910b-3872-4ac4-99cf-4b35292d9dd2\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.612005 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/71736582-5e3a-4026-bc6f-1b186295cd84-config-volume\") pod \"coredns-5d78c9869d-gvfts\" (UID: \"71736582-5e3a-4026-bc6f-1b186295cd84\") " pod="kube-system/coredns-5d78c9869d-gvfts" Oct 2 20:38:30.128067 kubelet[2488]: I1002 20:38:29.612065 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bdsbb\" (UniqueName: \"kubernetes.io/projected/71736582-5e3a-4026-bc6f-1b186295cd84-kube-api-access-bdsbb\") pod \"coredns-5d78c9869d-gvfts\" (UID: \"71736582-5e3a-4026-bc6f-1b186295cd84\") " pod="kube-system/coredns-5d78c9869d-gvfts" Oct 2 20:38:29.602361 systemd[1]: Created slice kubepods-burstable-pod19346e89_5378_4f48_a994_157b505e679d.slice. Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.631734 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.713082 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2983186f-0606-454b-bfe8-ca00bb7b34c1-varrun\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.813821 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2983186f-0606-454b-bfe8-ca00bb7b34c1-kubelet-dir\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.813892 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7lv46\" (UniqueName: \"kubernetes.io/projected/2983186f-0606-454b-bfe8-ca00bb7b34c1-kube-api-access-7lv46\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.813997 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2983186f-0606-454b-bfe8-ca00bb7b34c1-socket-dir\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.128414 kubelet[2488]: I1002 20:38:29.814027 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/2983186f-0606-454b-bfe8-ca00bb7b34c1-etccalico\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:29.610894 systemd[1]: Created slice kubepods-besteffort-pod9e59910b_3872_4ac4_99cf_4b35292d9dd2.slice. Oct 2 20:38:30.128675 kubelet[2488]: I1002 20:38:29.814072 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2983186f-0606-454b-bfe8-ca00bb7b34c1-registration-dir\") pod \"csi-node-driver-cvqct\" (UID: \"2983186f-0606-454b-bfe8-ca00bb7b34c1\") " pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:29.620380 systemd[1]: Created slice kubepods-burstable-pod71736582_5e3a_4026_bc6f_1b186295cd84.slice. Oct 2 20:38:29.640640 systemd[1]: Created slice kubepods-besteffort-pod2983186f_0606_454b_bfe8_ca00bb7b34c1.slice. Oct 2 20:38:30.464575 env[1352]: time="2023-10-02T20:38:30.463424941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-whh7w,Uid:19346e89-5378-4f48-a994-157b505e679d,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:30.464575 env[1352]: time="2023-10-02T20:38:30.463787861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfts,Uid:71736582-5e3a-4026-bc6f-1b186295cd84,Namespace:kube-system,Attempt:0,}" Oct 2 20:38:30.464575 env[1352]: time="2023-10-02T20:38:30.464405862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cvqct,Uid:2983186f-0606-454b-bfe8-ca00bb7b34c1,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:30.465130 env[1352]: time="2023-10-02T20:38:30.465092702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-v9p4h,Uid:9e59910b-3872-4ac4-99cf-4b35292d9dd2,Namespace:calico-system,Attempt:0,}" Oct 2 20:38:30.693436 env[1352]: time="2023-10-02T20:38:30.693389189Z" level=info msg="shim disconnected" id=2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f Oct 2 20:38:30.693436 env[1352]: time="2023-10-02T20:38:30.693430909Z" level=warning msg="cleaning up after shim disconnected" id=2ec8916cf0ab738d9d6db43951641a0809a5605b2b320dc0f33f42225eba319f namespace=k8s.io Oct 2 20:38:30.693436 env[1352]: time="2023-10-02T20:38:30.693440309Z" level=info msg="cleaning up dead shim" Oct 2 20:38:30.706148 env[1352]: time="2023-10-02T20:38:30.706099158Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:38:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3131 runtime=io.containerd.runc.v2\n" Oct 2 20:38:30.918696 env[1352]: time="2023-10-02T20:38:30.918621354Z" level=error msg="Failed to destroy network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.919011 env[1352]: time="2023-10-02T20:38:30.918974274Z" level=error msg="encountered an error cleaning up failed sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.919064 env[1352]: time="2023-10-02T20:38:30.919027074Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-whh7w,Uid:19346e89-5378-4f48-a994-157b505e679d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.920594 kubelet[2488]: E1002 20:38:30.919275 2488 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.920594 kubelet[2488]: E1002 20:38:30.919333 2488 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-whh7w" Oct 2 20:38:30.920594 kubelet[2488]: E1002 20:38:30.919352 2488 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-whh7w" Oct 2 20:38:30.920954 kubelet[2488]: E1002 20:38:30.919400 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-whh7w_kube-system(19346e89-5378-4f48-a994-157b505e679d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-whh7w_kube-system(19346e89-5378-4f48-a994-157b505e679d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-whh7w" podUID=19346e89-5378-4f48-a994-157b505e679d Oct 2 20:38:30.936990 env[1352]: time="2023-10-02T20:38:30.936924847Z" level=error msg="Failed to destroy network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.937309 env[1352]: time="2023-10-02T20:38:30.937276967Z" level=error msg="encountered an error cleaning up failed sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.937361 env[1352]: time="2023-10-02T20:38:30.937333807Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfts,Uid:71736582-5e3a-4026-bc6f-1b186295cd84,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.939781 kubelet[2488]: E1002 20:38:30.937579 2488 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.939781 kubelet[2488]: E1002 20:38:30.937640 2488 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvfts" Oct 2 20:38:30.939781 kubelet[2488]: E1002 20:38:30.937660 2488 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvfts" Oct 2 20:38:30.940073 kubelet[2488]: E1002 20:38:30.937708 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gvfts_kube-system(71736582-5e3a-4026-bc6f-1b186295cd84)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gvfts_kube-system(71736582-5e3a-4026-bc6f-1b186295cd84)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvfts" podUID=71736582-5e3a-4026-bc6f-1b186295cd84 Oct 2 20:38:30.955468 env[1352]: time="2023-10-02T20:38:30.953588539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:38:30.962001 kubelet[2488]: I1002 20:38:30.961393 2488 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:30.962380 env[1352]: time="2023-10-02T20:38:30.962348426Z" level=info msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" Oct 2 20:38:30.967770 kubelet[2488]: I1002 20:38:30.967199 2488 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:30.968828 env[1352]: time="2023-10-02T20:38:30.968788870Z" level=info msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" Oct 2 20:38:30.979482 env[1352]: time="2023-10-02T20:38:30.979430238Z" level=error msg="Failed to destroy network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.980010 env[1352]: time="2023-10-02T20:38:30.979976679Z" level=error msg="encountered an error cleaning up failed sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.980151 env[1352]: time="2023-10-02T20:38:30.980125119Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cvqct,Uid:2983186f-0606-454b-bfe8-ca00bb7b34c1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.982515 kubelet[2488]: E1002 20:38:30.980452 2488 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.982515 kubelet[2488]: E1002 20:38:30.980517 2488 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.982515 kubelet[2488]: E1002 20:38:30.980549 2488 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cvqct" Oct 2 20:38:30.983126 kubelet[2488]: E1002 20:38:30.982375 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:38:30.992397 env[1352]: time="2023-10-02T20:38:30.992341768Z" level=error msg="Failed to destroy network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.992714 env[1352]: time="2023-10-02T20:38:30.992673008Z" level=error msg="encountered an error cleaning up failed sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.992773 env[1352]: time="2023-10-02T20:38:30.992722528Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-v9p4h,Uid:9e59910b-3872-4ac4-99cf-4b35292d9dd2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.992945 kubelet[2488]: E1002 20:38:30.992906 2488 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:30.993008 kubelet[2488]: E1002 20:38:30.992952 2488 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" Oct 2 20:38:30.993008 kubelet[2488]: E1002 20:38:30.992976 2488 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" Oct 2 20:38:30.993091 kubelet[2488]: E1002 20:38:30.993024 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-v9p4h_calico-system(9e59910b-3872-4ac4-99cf-4b35292d9dd2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-v9p4h_calico-system(9e59910b-3872-4ac4-99cf-4b35292d9dd2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" podUID=9e59910b-3872-4ac4-99cf-4b35292d9dd2 Oct 2 20:38:31.029408 env[1352]: time="2023-10-02T20:38:31.029288874Z" level=error msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" failed" error="failed to destroy network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.029660 kubelet[2488]: E1002 20:38:31.029610 2488 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:31.029721 kubelet[2488]: E1002 20:38:31.029672 2488 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a} Oct 2 20:38:31.029721 kubelet[2488]: E1002 20:38:31.029706 2488 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"71736582-5e3a-4026-bc6f-1b186295cd84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.029801 kubelet[2488]: E1002 20:38:31.029750 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"71736582-5e3a-4026-bc6f-1b186295cd84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvfts" podUID=71736582-5e3a-4026-bc6f-1b186295cd84 Oct 2 20:38:31.031287 env[1352]: time="2023-10-02T20:38:31.031231316Z" level=error msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" failed" error="failed to destroy network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:31.031558 kubelet[2488]: E1002 20:38:31.031514 2488 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:31.031558 kubelet[2488]: E1002 20:38:31.031556 2488 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85} Oct 2 20:38:31.031647 kubelet[2488]: E1002 20:38:31.031597 2488 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"19346e89-5378-4f48-a994-157b505e679d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:31.031647 kubelet[2488]: E1002 20:38:31.031621 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"19346e89-5378-4f48-a994-157b505e679d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-whh7w" podUID=19346e89-5378-4f48-a994-157b505e679d Oct 2 20:38:31.168675 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85-shm.mount: Deactivated successfully. Oct 2 20:38:31.969997 kubelet[2488]: I1002 20:38:31.969505 2488 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:31.970489 env[1352]: time="2023-10-02T20:38:31.970453111Z" level=info msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" Oct 2 20:38:31.973550 kubelet[2488]: I1002 20:38:31.973332 2488 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:31.975312 env[1352]: time="2023-10-02T20:38:31.975274355Z" level=info msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" Oct 2 20:38:32.017409 env[1352]: time="2023-10-02T20:38:32.017314345Z" level=error msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" failed" error="failed to destroy network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:32.017671 kubelet[2488]: E1002 20:38:32.017616 2488 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:32.017671 kubelet[2488]: E1002 20:38:32.017651 2488 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698} Oct 2 20:38:32.017788 kubelet[2488]: E1002 20:38:32.017688 2488 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e59910b-3872-4ac4-99cf-4b35292d9dd2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:32.017788 kubelet[2488]: E1002 20:38:32.017716 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e59910b-3872-4ac4-99cf-4b35292d9dd2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" podUID=9e59910b-3872-4ac4-99cf-4b35292d9dd2 Oct 2 20:38:32.018351 env[1352]: time="2023-10-02T20:38:32.018317546Z" level=error msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" failed" error="failed to destroy network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:38:32.018727 kubelet[2488]: E1002 20:38:32.018699 2488 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:32.018727 kubelet[2488]: E1002 20:38:32.018728 2488 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda} Oct 2 20:38:32.018829 kubelet[2488]: E1002 20:38:32.018758 2488 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2983186f-0606-454b-bfe8-ca00bb7b34c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:38:32.018829 kubelet[2488]: E1002 20:38:32.018782 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2983186f-0606-454b-bfe8-ca00bb7b34c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:38:35.691080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2144009469.mount: Deactivated successfully. Oct 2 20:38:35.801056 env[1352]: time="2023-10-02T20:38:35.800999244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.805986 env[1352]: time="2023-10-02T20:38:35.805941727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.809529 env[1352]: time="2023-10-02T20:38:35.809488090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.813390 env[1352]: time="2023-10-02T20:38:35.813353052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:35.813925 env[1352]: time="2023-10-02T20:38:35.813897093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 20:38:35.818019 env[1352]: time="2023-10-02T20:38:35.817972335Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:38:35.843173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount259211871.mount: Deactivated successfully. Oct 2 20:38:35.848175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3092907837.mount: Deactivated successfully. Oct 2 20:38:35.860850 env[1352]: time="2023-10-02T20:38:35.860808804Z" level=info msg="CreateContainer within sandbox \"0405dd06aac576116a01289768782f2c7d51a03ef4f81d7d6a5e6cd1fc779bac\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2\"" Oct 2 20:38:35.861571 env[1352]: time="2023-10-02T20:38:35.861384085Z" level=info msg="StartContainer for \"e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2\"" Oct 2 20:38:35.883076 systemd[1]: Started cri-containerd-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2.scope. Oct 2 20:38:35.907000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913702 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 20:38:35.913795 kernel: audit: type=1400 audit(1696279115.907:1152): avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.907000 audit[3356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2894 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.957032 kernel: audit: type=1300 audit(1696279115.907:1152): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2894 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531613763336433336234333439303565316639613336613638643631 Oct 2 20:38:35.981144 kernel: audit: type=1327 audit(1696279115.907:1152): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531613763336433336234333439303565316639613336613638643631 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.003711 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.021108 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.040831 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.040995 env[1352]: time="2023-10-02T20:38:36.024589275Z" level=info msg="StartContainer for \"e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2\" returns successfully" Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.079488 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.079595 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.097934 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:36.116220 kernel: audit: type=1400 audit(1696279115.910:1153): avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.910000 audit: BPF prog-id=146 op=LOAD Oct 2 20:38:35.910000 audit[3356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2894 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531613763336433336234333439303565316639613336613638643631 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.913000 audit: BPF prog-id=147 op=LOAD Oct 2 20:38:35.913000 audit[3356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2894 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531613763336433336234333439303565316639613336613638643631 Oct 2 20:38:35.930000 audit: BPF prog-id=147 op=UNLOAD Oct 2 20:38:35.930000 audit: BPF prog-id=146 op=UNLOAD Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:35.930000 audit: BPF prog-id=148 op=LOAD Oct 2 20:38:35.930000 audit[3356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2894 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:35.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531613763336433336234333439303565316639613336613638643631 Oct 2 20:38:36.295769 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:38:36.295924 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:38:37.016997 kubelet[2488]: I1002 20:38:37.016965 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jmrs9" podStartSLOduration=2.101040686 podCreationTimestamp="2023-10-02 20:38:18 +0000 UTC" firstStartedPulling="2023-10-02 20:38:18.898280324 +0000 UTC m=+22.214427609" lastFinishedPulling="2023-10-02 20:38:35.814168973 +0000 UTC m=+39.130316218" observedRunningTime="2023-10-02 20:38:37.016445254 +0000 UTC m=+40.332592539" watchObservedRunningTime="2023-10-02 20:38:37.016929295 +0000 UTC m=+40.333076540" Oct 2 20:38:37.035148 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.Wsn7og.mount: Deactivated successfully. Oct 2 20:38:37.703000 audit[3502]: AVC avc: denied { write } for pid=3502 comm="tee" name="fd" dev="proc" ino=24250 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.704000 audit[3498]: AVC avc: denied { write } for pid=3498 comm="tee" name="fd" dev="proc" ino=24253 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.705000 audit[3516]: AVC avc: denied { write } for pid=3516 comm="tee" name="fd" dev="proc" ino=24591 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.705000 audit[3516]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc80896d a2=241 a3=1b6 items=1 ppid=3458 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.705000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:38:37.705000 audit: PATH item=0 name="/dev/fd/63" inode=24585 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.705000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.712000 audit[3504]: AVC avc: denied { write } for pid=3504 comm="tee" name="fd" dev="proc" ino=24258 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.704000 audit[3498]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5ed795e a2=241 a3=1b6 items=1 ppid=3455 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.704000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:38:37.704000 audit: PATH item=0 name="/dev/fd/63" inode=24235 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.704000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.714000 audit[3518]: AVC avc: denied { write } for pid=3518 comm="tee" name="fd" dev="proc" ino=24595 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.714000 audit[3518]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeb40996f a2=241 a3=1b6 items=1 ppid=3451 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.714000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:38:37.714000 audit: PATH item=0 name="/dev/fd/63" inode=24586 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.703000 audit[3502]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb56a95d a2=241 a3=1b6 items=1 ppid=3448 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.703000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:38:37.703000 audit: PATH item=0 name="/dev/fd/63" inode=23549 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.712000 audit[3504]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde1ce96e a2=241 a3=1b6 items=1 ppid=3450 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.712000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:38:37.712000 audit: PATH item=0 name="/dev/fd/63" inode=24238 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.712000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.720000 audit[3514]: AVC avc: denied { write } for pid=3514 comm="tee" name="fd" dev="proc" ino=24600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.720000 audit[3514]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2a4f96d a2=241 a3=1b6 items=1 ppid=3454 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.720000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:38:37.720000 audit: PATH item=0 name="/dev/fd/63" inode=24247 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:37.750000 audit[3522]: AVC avc: denied { write } for pid=3522 comm="tee" name="fd" dev="proc" ino=24289 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:38:37.750000 audit[3522]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1ed496d a2=241 a3=1b6 items=1 ppid=3459 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:37.750000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:38:37.750000 audit: PATH item=0 name="/dev/fd/63" inode=24255 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:38:37.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:38:38.029989 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.iphpJH.mount: Deactivated successfully. Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit: BPF prog-id=149 op=LOAD Oct 2 20:38:38.083000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc069dff8 a2=70 a3=0 items=0 ppid=3460 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.083000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.083000 audit: BPF prog-id=149 op=UNLOAD Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit: BPF prog-id=150 op=LOAD Oct 2 20:38:38.083000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc069dff8 a2=70 a3=4a174c items=0 ppid=3460 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.083000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.083000 audit: BPF prog-id=150 op=UNLOAD Oct 2 20:38:38.083000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.083000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc069e028 a2=70 a3=3461679f items=0 ppid=3460 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.083000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.084000 audit: BPF prog-id=151 op=LOAD Oct 2 20:38:38.084000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc069df78 a2=70 a3=346167b9 items=0 ppid=3460 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.084000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:38:38.100000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.100000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff0168f58 a2=70 a3=0 items=0 ppid=3460 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.101000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:38.101000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff0168e38 a2=70 a3=2 items=0 ppid=3460 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:38:38.106000 audit: BPF prog-id=151 op=UNLOAD Oct 2 20:38:38.367000 audit[3640]: NETFILTER_CFG table=mangle:100 family=2 entries=19 op=nft_register_chain pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.367000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffff45d85e0 a2=0 a3=ffffbde3cfa0 items=0 ppid=3460 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.367000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.409000 audit[3639]: NETFILTER_CFG table=raw:101 family=2 entries=19 op=nft_register_chain pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.409000 audit[3639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffce12c840 a2=0 a3=ffffb92d2fa0 items=0 ppid=3460 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.413000 audit[3643]: NETFILTER_CFG table=nat:102 family=2 entries=16 op=nft_register_chain pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.413000 audit[3643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffbbcf4a0 a2=0 a3=ffff8c559fa0 items=0 ppid=3460 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.413000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.414000 audit[3641]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:38.414000 audit[3641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff9334910 a2=0 a3=ffff940bdfa0 items=0 ppid=3460 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:38.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:38.998079 systemd-networkd[1500]: vxlan.calico: Link UP Oct 2 20:38:38.998089 systemd-networkd[1500]: vxlan.calico: Gained carrier Oct 2 20:38:39.025507 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.J7tlLM.mount: Deactivated successfully. Oct 2 20:38:40.640651 systemd-networkd[1500]: vxlan.calico: Gained IPv6LL Oct 2 20:38:41.850016 env[1352]: time="2023-10-02T20:38:41.849976536Z" level=info msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.902 [INFO][3709] k8s.go 576: Cleaning up netns ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.905 [INFO][3709] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" iface="eth0" netns="/var/run/netns/cni-cc8b17db-d7ec-aca4-db58-9af158ae18a7" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.905 [INFO][3709] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" iface="eth0" netns="/var/run/netns/cni-cc8b17db-d7ec-aca4-db58-9af158ae18a7" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.906 [INFO][3709] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" iface="eth0" netns="/var/run/netns/cni-cc8b17db-d7ec-aca4-db58-9af158ae18a7" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.906 [INFO][3709] k8s.go 583: Releasing IP address(es) ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.906 [INFO][3709] utils.go 196: Calico CNI releasing IP address ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.931 [INFO][3716] ipam_plugin.go 416: Releasing address using handleID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:41.944406 env[1352]: time="2023-10-02T20:38:41Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:41.944406 env[1352]: time="2023-10-02T20:38:41Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.941 [WARNING][3716] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.941 [INFO][3716] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:41.944406 env[1352]: time="2023-10-02T20:38:41Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:41.944406 env[1352]: 2023-10-02 20:38:41.943 [INFO][3709] k8s.go 589: Teardown processing complete. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:41.946621 env[1352]: time="2023-10-02T20:38:41.946578875Z" level=info msg="TearDown network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" successfully" Oct 2 20:38:41.946734 env[1352]: time="2023-10-02T20:38:41.946717636Z" level=info msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" returns successfully" Oct 2 20:38:41.947829 systemd[1]: run-netns-cni\x2dcc8b17db\x2dd7ec\x2daca4\x2ddb58\x2d9af158ae18a7.mount: Deactivated successfully. Oct 2 20:38:41.949260 env[1352]: time="2023-10-02T20:38:41.949228917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-whh7w,Uid:19346e89-5378-4f48-a994-157b505e679d,Namespace:kube-system,Attempt:1,}" Oct 2 20:38:42.125388 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:38:42.125512 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali02c69b8f90f: link becomes ready Oct 2 20:38:42.132713 systemd-networkd[1500]: cali02c69b8f90f: Link UP Oct 2 20:38:42.132720 systemd-networkd[1500]: cali02c69b8f90f: Gained carrier Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.043 [INFO][3723] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0 coredns-5d78c9869d- kube-system 19346e89-5378-4f48-a994-157b505e679d 690 0 2023-10-02 20:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b coredns-5d78c9869d-whh7w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali02c69b8f90f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.044 [INFO][3723] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.074 [INFO][3735] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" HandleID="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.088 [INFO][3735] ipam_plugin.go 269: Auto assigning IP ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" HandleID="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d7e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"coredns-5d78c9869d-whh7w", "timestamp":"2023-10-02 20:38:42.074486194 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:42.161872 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:42.161872 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.089 [INFO][3735] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.090 [INFO][3735] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.094 [INFO][3735] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.097 [INFO][3735] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.099 [INFO][3735] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.100 [INFO][3735] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.100 [INFO][3735] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.102 [INFO][3735] ipam.go 1682: Creating new handle: k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499 Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.105 [INFO][3735] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.109 [INFO][3735] ipam.go 1216: Successfully claimed IPs: [192.168.97.193/26] block=192.168.97.192/26 handle="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.109 [INFO][3735] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.193/26] handle="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:42.161872 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:42.161872 env[1352]: 2023-10-02 20:38:42.109 [INFO][3735] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.193/26] IPv6=[] ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" HandleID="k8s-pod-network.6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.111 [INFO][3723] k8s.go 383: Populated endpoint ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"19346e89-5378-4f48-a994-157b505e679d", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"coredns-5d78c9869d-whh7w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02c69b8f90f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.111 [INFO][3723] k8s.go 384: Calico CNI using IPs: [192.168.97.193/32] ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.112 [INFO][3723] dataplane_linux.go 68: Setting the host side veth name to cali02c69b8f90f ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.126 [INFO][3723] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.133 [INFO][3723] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"19346e89-5378-4f48-a994-157b505e679d", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499", Pod:"coredns-5d78c9869d-whh7w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02c69b8f90f", MAC:"9a:c8:14:d1:f6:8a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:42.162622 env[1352]: 2023-10-02 20:38:42.159 [INFO][3723] k8s.go 489: Wrote updated endpoint to datastore ContainerID="6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499" Namespace="kube-system" Pod="coredns-5d78c9869d-whh7w" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:42.179000 audit[3764]: NETFILTER_CFG table=filter:104 family=2 entries=36 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:42.185995 kernel: kauditd_printk_skb: 129 callbacks suppressed Oct 2 20:38:42.186089 kernel: audit: type=1325 audit(1696279122.179:1178): table=filter:104 family=2 entries=36 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:42.179000 audit[3764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffffcc89070 a2=0 a3=ffffb945ffa0 items=0 ppid=3460 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.207577 env[1352]: time="2023-10-02T20:38:42.207495275Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:42.207763 env[1352]: time="2023-10-02T20:38:42.207738755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:42.207886 env[1352]: time="2023-10-02T20:38:42.207863755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:42.208168 env[1352]: time="2023-10-02T20:38:42.208137196Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499 pid=3767 runtime=io.containerd.runc.v2 Oct 2 20:38:42.227728 kernel: audit: type=1300 audit(1696279122.179:1178): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffffcc89070 a2=0 a3=ffffb945ffa0 items=0 ppid=3460 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.246879 kernel: audit: type=1327 audit(1696279122.179:1178): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:42.179000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:42.252857 systemd[1]: Started cri-containerd-6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499.scope. Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304936 kernel: audit: type=1400 audit(1696279122.269:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.305041 kernel: audit: type=1400 audit(1696279122.269:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322100 kernel: audit: type=1400 audit(1696279122.269:1181): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.341000 kernel: audit: type=1400 audit(1696279122.269:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.358963 kernel: audit: type=1400 audit(1696279122.269:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.380578 kernel: audit: type=1400 audit(1696279122.269:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.407119 kernel: audit: type=1400 audit(1696279122.269:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.287000 audit: BPF prog-id=152 op=LOAD Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3767 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373035363564613731613937383431613331623164616433386334 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3767 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373035363564613731613937383431613331623164616433386334 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.304000 audit: BPF prog-id=153 op=LOAD Oct 2 20:38:42.304000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3767 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373035363564613731613937383431613331623164616433386334 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.321000 audit: BPF prog-id=154 op=LOAD Oct 2 20:38:42.321000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3767 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373035363564613731613937383431613331623164616433386334 Oct 2 20:38:42.321000 audit: BPF prog-id=154 op=UNLOAD Oct 2 20:38:42.322000 audit: BPF prog-id=153 op=UNLOAD Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.322000 audit: BPF prog-id=155 op=LOAD Oct 2 20:38:42.322000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3767 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373035363564613731613937383431613331623164616433386334 Oct 2 20:38:42.422011 env[1352]: time="2023-10-02T20:38:42.421970126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-whh7w,Uid:19346e89-5378-4f48-a994-157b505e679d,Namespace:kube-system,Attempt:1,} returns sandbox id \"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499\"" Oct 2 20:38:42.426225 env[1352]: time="2023-10-02T20:38:42.426190289Z" level=info msg="CreateContainer within sandbox \"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:42.468114 env[1352]: time="2023-10-02T20:38:42.468063234Z" level=info msg="CreateContainer within sandbox \"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"16e6e2ad1648628fdb192395a32a516dd6728d0d414622e3ae9ba5a8db1bdc00\"" Oct 2 20:38:42.468928 env[1352]: time="2023-10-02T20:38:42.468762915Z" level=info msg="StartContainer for \"16e6e2ad1648628fdb192395a32a516dd6728d0d414622e3ae9ba5a8db1bdc00\"" Oct 2 20:38:42.488027 systemd[1]: Started cri-containerd-16e6e2ad1648628fdb192395a32a516dd6728d0d414622e3ae9ba5a8db1bdc00.scope. Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.506000 audit: BPF prog-id=156 op=LOAD Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3767 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136653665326164313634383632386664623139323339356133326135 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3767 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136653665326164313634383632386664623139323339356133326135 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.507000 audit: BPF prog-id=157 op=LOAD Oct 2 20:38:42.507000 audit[3816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3767 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136653665326164313634383632386664623139323339356133326135 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit: BPF prog-id=158 op=LOAD Oct 2 20:38:42.508000 audit[3816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3767 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136653665326164313634383632386664623139323339356133326135 Oct 2 20:38:42.508000 audit: BPF prog-id=158 op=UNLOAD Oct 2 20:38:42.508000 audit: BPF prog-id=157 op=UNLOAD Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:42.508000 audit: BPF prog-id=159 op=LOAD Oct 2 20:38:42.508000 audit[3816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3767 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:42.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136653665326164313634383632386664623139323339356133326135 Oct 2 20:38:42.529433 env[1352]: time="2023-10-02T20:38:42.529375912Z" level=info msg="StartContainer for \"16e6e2ad1648628fdb192395a32a516dd6728d0d414622e3ae9ba5a8db1bdc00\" returns successfully" Oct 2 20:38:42.849980 env[1352]: time="2023-10-02T20:38:42.849934108Z" level=info msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.903 [INFO][3859] k8s.go 576: Cleaning up netns ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.904 [INFO][3859] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" iface="eth0" netns="/var/run/netns/cni-d3bd5f8c-079f-4272-29fd-bfe02916588f" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.904 [INFO][3859] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" iface="eth0" netns="/var/run/netns/cni-d3bd5f8c-079f-4272-29fd-bfe02916588f" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.904 [INFO][3859] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" iface="eth0" netns="/var/run/netns/cni-d3bd5f8c-079f-4272-29fd-bfe02916588f" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.904 [INFO][3859] k8s.go 583: Releasing IP address(es) ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.904 [INFO][3859] utils.go 196: Calico CNI releasing IP address ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.929 [INFO][3865] ipam_plugin.go 416: Releasing address using handleID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:42.942652 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:42.942652 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.939 [WARNING][3865] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.939 [INFO][3865] ipam_plugin.go 444: Releasing address using workloadID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:42.942652 env[1352]: time="2023-10-02T20:38:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:42.942652 env[1352]: 2023-10-02 20:38:42.941 [INFO][3859] k8s.go 589: Teardown processing complete. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:42.943434 env[1352]: time="2023-10-02T20:38:42.943394245Z" level=info msg="TearDown network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" successfully" Oct 2 20:38:42.943508 env[1352]: time="2023-10-02T20:38:42.943492485Z" level=info msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" returns successfully" Oct 2 20:38:42.944233 env[1352]: time="2023-10-02T20:38:42.944199845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-v9p4h,Uid:9e59910b-3872-4ac4-99cf-4b35292d9dd2,Namespace:calico-system,Attempt:1,}" Oct 2 20:38:42.947270 systemd[1]: run-containerd-runc-k8s.io-6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499-runc.WG2s1d.mount: Deactivated successfully. Oct 2 20:38:42.947353 systemd[1]: run-netns-cni\x2dd3bd5f8c\x2d079f\x2d4272\x2d29fd\x2dbfe02916588f.mount: Deactivated successfully. Oct 2 20:38:43.036011 kubelet[2488]: I1002 20:38:43.035633 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-whh7w" podStartSLOduration=32.035460901 podCreationTimestamp="2023-10-02 20:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:43.035367101 +0000 UTC m=+46.351514386" watchObservedRunningTime="2023-10-02 20:38:43.035460901 +0000 UTC m=+46.351608226" Oct 2 20:38:43.057000 audit[3888]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:43.057000 audit[3888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe2cc69c0 a2=0 a3=ffffb6fbb6c0 items=0 ppid=2661 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:43.060000 audit[3888]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:43.060000 audit[3888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffe2cc69c0 a2=0 a3=ffffb6fbb6c0 items=0 ppid=2661 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:43.091000 audit[3892]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=3892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:43.091000 audit[3892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd40d0670 a2=0 a3=ffff865946c0 items=0 ppid=2661 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:43.092000 audit[3892]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=3892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:43.092000 audit[3892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd40d0670 a2=0 a3=ffff865946c0 items=0 ppid=2661 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:43.133698 systemd-networkd[1500]: cali8eecb820b73: Link UP Oct 2 20:38:43.145847 systemd-networkd[1500]: cali8eecb820b73: Gained carrier Oct 2 20:38:43.146626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8eecb820b73: link becomes ready Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.016 [INFO][3871] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0 calico-kube-controllers-7bd445fdb4- calico-system 9e59910b-3872-4ac4-99cf-4b35292d9dd2 699 0 2023-10-02 20:38:18 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b calico-kube-controllers-7bd445fdb4-v9p4h eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali8eecb820b73 [] []}} ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.016 [INFO][3871] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.079 [INFO][3883] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" HandleID="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.099 [INFO][3883] ipam_plugin.go 269: Auto assigning IP ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" HandleID="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001027b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"calico-kube-controllers-7bd445fdb4-v9p4h", "timestamp":"2023-10-02 20:38:43.079221567 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:43.159480 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:43.159480 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.099 [INFO][3883] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.102 [INFO][3883] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.105 [INFO][3883] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.108 [INFO][3883] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.110 [INFO][3883] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.112 [INFO][3883] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.112 [INFO][3883] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.113 [INFO][3883] ipam.go 1682: Creating new handle: k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.116 [INFO][3883] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.120 [INFO][3883] ipam.go 1216: Successfully claimed IPs: [192.168.97.194/26] block=192.168.97.192/26 handle="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.120 [INFO][3883] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.194/26] handle="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:43.159480 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:43.159480 env[1352]: 2023-10-02 20:38:43.120 [INFO][3883] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.194/26] IPv6=[] ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" HandleID="k8s-pod-network.55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.121 [INFO][3871] k8s.go 383: Populated endpoint ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"9e59910b-3872-4ac4-99cf-4b35292d9dd2", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-v9p4h", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.97.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8eecb820b73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.121 [INFO][3871] k8s.go 384: Calico CNI using IPs: [192.168.97.194/32] ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.121 [INFO][3871] dataplane_linux.go 68: Setting the host side veth name to cali8eecb820b73 ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.122 [INFO][3871] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.145 [INFO][3871] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"9e59910b-3872-4ac4-99cf-4b35292d9dd2", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc", Pod:"calico-kube-controllers-7bd445fdb4-v9p4h", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.97.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8eecb820b73", MAC:"d2:4d:10:01:f4:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:43.160080 env[1352]: 2023-10-02 20:38:43.158 [INFO][3871] k8s.go 489: Wrote updated endpoint to datastore ContainerID="55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-v9p4h" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:43.184399 env[1352]: time="2023-10-02T20:38:43.184323550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:43.184399 env[1352]: time="2023-10-02T20:38:43.184361990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:43.184637 env[1352]: time="2023-10-02T20:38:43.184372750Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:43.184798 env[1352]: time="2023-10-02T20:38:43.184760551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc pid=3916 runtime=io.containerd.runc.v2 Oct 2 20:38:43.188000 audit[3922]: NETFILTER_CFG table=filter:109 family=2 entries=40 op=nft_register_chain pid=3922 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:43.188000 audit[3922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffe7d5b170 a2=0 a3=ffff94dd3fa0 items=0 ppid=3460 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.188000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:43.202905 systemd[1]: Started cri-containerd-55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc.scope. Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit: BPF prog-id=160 op=LOAD Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000245b38 a2=10 a3=0 items=0 ppid=3916 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653965376164626539636664373464666661616231336564323530 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=3916 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653965376164626539636664373464666661616231336564323530 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit: BPF prog-id=161 op=LOAD Oct 2 20:38:43.222000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=3916 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653965376164626539636664373464666661616231336564323530 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit: BPF prog-id=162 op=LOAD Oct 2 20:38:43.222000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=3916 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653965376164626539636664373464666661616231336564323530 Oct 2 20:38:43.222000 audit: BPF prog-id=162 op=UNLOAD Oct 2 20:38:43.222000 audit: BPF prog-id=161 op=UNLOAD Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:43.222000 audit: BPF prog-id=163 op=LOAD Oct 2 20:38:43.222000 audit[3929]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=3916 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:43.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653965376164626539636664373464666661616231336564323530 Oct 2 20:38:43.246102 env[1352]: time="2023-10-02T20:38:43.246052788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-v9p4h,Uid:9e59910b-3872-4ac4-99cf-4b35292d9dd2,Namespace:calico-system,Attempt:1,} returns sandbox id \"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc\"" Oct 2 20:38:43.248821 env[1352]: time="2023-10-02T20:38:43.247823589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 20:38:43.265230 systemd-networkd[1500]: cali02c69b8f90f: Gained IPv6LL Oct 2 20:38:43.850301 env[1352]: time="2023-10-02T20:38:43.850263992Z" level=info msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.908 [INFO][3965] k8s.go 576: Cleaning up netns ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.909 [INFO][3965] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" iface="eth0" netns="/var/run/netns/cni-9b5ffd07-e586-804f-7295-ff0328310d05" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.909 [INFO][3965] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" iface="eth0" netns="/var/run/netns/cni-9b5ffd07-e586-804f-7295-ff0328310d05" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.910 [INFO][3965] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" iface="eth0" netns="/var/run/netns/cni-9b5ffd07-e586-804f-7295-ff0328310d05" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.910 [INFO][3965] k8s.go 583: Releasing IP address(es) ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.910 [INFO][3965] utils.go 196: Calico CNI releasing IP address ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.940 [INFO][3971] ipam_plugin.go 416: Releasing address using handleID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:43.955691 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:43.955691 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.952 [WARNING][3971] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.952 [INFO][3971] ipam_plugin.go 444: Releasing address using workloadID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:43.955691 env[1352]: time="2023-10-02T20:38:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:43.955691 env[1352]: 2023-10-02 20:38:43.954 [INFO][3965] k8s.go 589: Teardown processing complete. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:43.959409 env[1352]: time="2023-10-02T20:38:43.957583096Z" level=info msg="TearDown network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" successfully" Oct 2 20:38:43.959409 env[1352]: time="2023-10-02T20:38:43.957621496Z" level=info msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" returns successfully" Oct 2 20:38:43.958869 systemd[1]: run-netns-cni\x2d9b5ffd07\x2de586\x2d804f\x2d7295\x2dff0328310d05.mount: Deactivated successfully. Oct 2 20:38:43.960830 env[1352]: time="2023-10-02T20:38:43.960047698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfts,Uid:71736582-5e3a-4026-bc6f-1b186295cd84,Namespace:kube-system,Attempt:1,}" Oct 2 20:38:44.124630 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79bfb72d8f1: link becomes ready Oct 2 20:38:44.133834 systemd-networkd[1500]: cali79bfb72d8f1: Link UP Oct 2 20:38:44.133840 systemd-networkd[1500]: cali79bfb72d8f1: Gained carrier Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.047 [INFO][3977] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0 coredns-5d78c9869d- kube-system 71736582-5e3a-4026-bc6f-1b186295cd84 716 0 2023-10-02 20:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b coredns-5d78c9869d-gvfts eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali79bfb72d8f1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.047 [INFO][3977] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.082 [INFO][3990] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" HandleID="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.094 [INFO][3990] ipam_plugin.go 269: Auto assigning IP ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" HandleID="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000101c90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"coredns-5d78c9869d-gvfts", "timestamp":"2023-10-02 20:38:44.082320411 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:44.153418 env[1352]: time="2023-10-02T20:38:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:44.153418 env[1352]: time="2023-10-02T20:38:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.094 [INFO][3990] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.096 [INFO][3990] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.099 [INFO][3990] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.102 [INFO][3990] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.103 [INFO][3990] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.105 [INFO][3990] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.105 [INFO][3990] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.106 [INFO][3990] ipam.go 1682: Creating new handle: k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840 Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.109 [INFO][3990] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.114 [INFO][3990] ipam.go 1216: Successfully claimed IPs: [192.168.97.195/26] block=192.168.97.192/26 handle="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.114 [INFO][3990] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.195/26] handle="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:44.153418 env[1352]: time="2023-10-02T20:38:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:44.153418 env[1352]: 2023-10-02 20:38:44.114 [INFO][3990] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.195/26] IPv6=[] ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" HandleID="k8s-pod-network.e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.116 [INFO][3977] k8s.go 383: Populated endpoint ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"71736582-5e3a-4026-bc6f-1b186295cd84", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"coredns-5d78c9869d-gvfts", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79bfb72d8f1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.116 [INFO][3977] k8s.go 384: Calico CNI using IPs: [192.168.97.195/32] ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.116 [INFO][3977] dataplane_linux.go 68: Setting the host side veth name to cali79bfb72d8f1 ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.124 [INFO][3977] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.140 [INFO][3977] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"71736582-5e3a-4026-bc6f-1b186295cd84", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840", Pod:"coredns-5d78c9869d-gvfts", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79bfb72d8f1", MAC:"e2:8f:f6:b1:c6:62", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:44.154065 env[1352]: 2023-10-02 20:38:44.151 [INFO][3977] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfts" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:44.160658 systemd-networkd[1500]: cali8eecb820b73: Gained IPv6LL Oct 2 20:38:44.177000 audit[4008]: NETFILTER_CFG table=filter:110 family=2 entries=34 op=nft_register_chain pid=4008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:44.177000 audit[4008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=ffffcde68830 a2=0 a3=ffffab479fa0 items=0 ppid=3460 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:44.184245 env[1352]: time="2023-10-02T20:38:44.184172792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:44.184245 env[1352]: time="2023-10-02T20:38:44.184214152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:44.184453 env[1352]: time="2023-10-02T20:38:44.184224432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:44.184543 env[1352]: time="2023-10-02T20:38:44.184449072Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840 pid=4018 runtime=io.containerd.runc.v2 Oct 2 20:38:44.204257 systemd[1]: Started cri-containerd-e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840.scope. Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit: BPF prog-id=164 op=LOAD Oct 2 20:38:44.222000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[4029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393230396666383433303433633632616130626532663134376339 Oct 2 20:38:44.222000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.222000 audit[4029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393230396666383433303433633632616130626532663134376339 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit: BPF prog-id=165 op=LOAD Oct 2 20:38:44.223000 audit[4029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393230396666383433303433633632616130626532663134376339 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit: BPF prog-id=166 op=LOAD Oct 2 20:38:44.223000 audit[4029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393230396666383433303433633632616130626532663134376339 Oct 2 20:38:44.223000 audit: BPF prog-id=166 op=UNLOAD Oct 2 20:38:44.223000 audit: BPF prog-id=165 op=UNLOAD Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.223000 audit: BPF prog-id=167 op=LOAD Oct 2 20:38:44.223000 audit[4029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4018 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393230396666383433303433633632616130626532663134376339 Oct 2 20:38:44.247107 env[1352]: time="2023-10-02T20:38:44.247063589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfts,Uid:71736582-5e3a-4026-bc6f-1b186295cd84,Namespace:kube-system,Attempt:1,} returns sandbox id \"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840\"" Oct 2 20:38:44.251126 env[1352]: time="2023-10-02T20:38:44.251095151Z" level=info msg="CreateContainer within sandbox \"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:38:44.287001 env[1352]: time="2023-10-02T20:38:44.286951333Z" level=info msg="CreateContainer within sandbox \"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"48b96d844499f3807cb25030b8eb494ed9a44667a7928755d6262f5ab84f84b1\"" Oct 2 20:38:44.289110 env[1352]: time="2023-10-02T20:38:44.287697933Z" level=info msg="StartContainer for \"48b96d844499f3807cb25030b8eb494ed9a44667a7928755d6262f5ab84f84b1\"" Oct 2 20:38:44.307063 systemd[1]: Started cri-containerd-48b96d844499f3807cb25030b8eb494ed9a44667a7928755d6262f5ab84f84b1.scope. Oct 2 20:38:44.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit: BPF prog-id=168 op=LOAD Oct 2 20:38:44.323000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[4064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4018 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623936643834343439396633383037636232353033306238656234 Oct 2 20:38:44.323000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.323000 audit[4064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4018 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623936643834343439396633383037636232353033306238656234 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit: BPF prog-id=169 op=LOAD Oct 2 20:38:44.324000 audit[4064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4018 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623936643834343439396633383037636232353033306238656234 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit: BPF prog-id=170 op=LOAD Oct 2 20:38:44.324000 audit[4064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4018 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623936643834343439396633383037636232353033306238656234 Oct 2 20:38:44.324000 audit: BPF prog-id=170 op=UNLOAD Oct 2 20:38:44.324000 audit: BPF prog-id=169 op=UNLOAD Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:44.324000 audit: BPF prog-id=171 op=LOAD Oct 2 20:38:44.324000 audit[4064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4018 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623936643834343439396633383037636232353033306238656234 Oct 2 20:38:44.347852 env[1352]: time="2023-10-02T20:38:44.347801369Z" level=info msg="StartContainer for \"48b96d844499f3807cb25030b8eb494ed9a44667a7928755d6262f5ab84f84b1\" returns successfully" Oct 2 20:38:45.041263 kubelet[2488]: I1002 20:38:45.041123 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gvfts" podStartSLOduration=34.041089021 podCreationTimestamp="2023-10-02 20:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:38:45.038002859 +0000 UTC m=+48.354150104" watchObservedRunningTime="2023-10-02 20:38:45.041089021 +0000 UTC m=+48.357236306" Oct 2 20:38:45.053000 audit[4096]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:45.053000 audit[4096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd63203c0 a2=0 a3=ffff8d42a6c0 items=0 ppid=2661 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:45.054000 audit[4096]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:45.054000 audit[4096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd63203c0 a2=0 a3=ffff8d42a6c0 items=0 ppid=2661 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:45.157658 env[1352]: time="2023-10-02T20:38:45.157616129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:45.166328 env[1352]: time="2023-10-02T20:38:45.166260294Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:45.171316 env[1352]: time="2023-10-02T20:38:45.171289697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:45.176876 env[1352]: time="2023-10-02T20:38:45.176833501Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:38:45.177290 env[1352]: time="2023-10-02T20:38:45.177256021Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 20:38:45.181760 env[1352]: time="2023-10-02T20:38:45.181732023Z" level=info msg="CreateContainer within sandbox \"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 20:38:45.220134 env[1352]: time="2023-10-02T20:38:45.220091886Z" level=info msg="CreateContainer within sandbox \"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2\"" Oct 2 20:38:45.220832 env[1352]: time="2023-10-02T20:38:45.220799846Z" level=info msg="StartContainer for \"ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2\"" Oct 2 20:38:45.243701 systemd[1]: Started cri-containerd-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2.scope. Oct 2 20:38:45.248745 systemd-networkd[1500]: cali79bfb72d8f1: Gained IPv6LL Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.264000 audit: BPF prog-id=172 op=LOAD Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3916 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373062666132336634366365613161313063303234656334643963 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3916 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373062666132336634366365613161313063303234656334643963 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.265000 audit: BPF prog-id=173 op=LOAD Oct 2 20:38:45.265000 audit[4108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3916 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373062666132336634366365613161313063303234656334643963 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.266000 audit: BPF prog-id=174 op=LOAD Oct 2 20:38:45.266000 audit[4108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3916 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373062666132336634366365613161313063303234656334643963 Oct 2 20:38:45.266000 audit: BPF prog-id=174 op=UNLOAD Oct 2 20:38:45.266000 audit: BPF prog-id=173 op=UNLOAD Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { perfmon } for pid=4108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit[4108]: AVC avc: denied { bpf } for pid=4108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:45.267000 audit: BPF prog-id=175 op=LOAD Oct 2 20:38:45.267000 audit[4108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3916 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:45.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373062666132336634366365613161313063303234656334643963 Oct 2 20:38:45.284810 env[1352]: time="2023-10-02T20:38:45.284756764Z" level=info msg="StartContainer for \"ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2\" returns successfully" Oct 2 20:38:46.041334 kubelet[2488]: I1002 20:38:46.041230 2488 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-v9p4h" podStartSLOduration=26.111043855 podCreationTimestamp="2023-10-02 20:38:18 +0000 UTC" firstStartedPulling="2023-10-02 20:38:43.247453348 +0000 UTC m=+46.563600593" lastFinishedPulling="2023-10-02 20:38:45.177606541 +0000 UTC m=+48.493753826" observedRunningTime="2023-10-02 20:38:46.041081528 +0000 UTC m=+49.357228813" watchObservedRunningTime="2023-10-02 20:38:46.041197088 +0000 UTC m=+49.357344333" Oct 2 20:38:46.070661 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.w30xMt.mount: Deactivated successfully. Oct 2 20:38:46.091000 audit[4153]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:46.091000 audit[4153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffea654e40 a2=0 a3=ffff8a6b66c0 items=0 ppid=2661 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:46.449000 audit[4153]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:46.449000 audit[4153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffea654e40 a2=0 a3=ffff8a6b66c0 items=0 ppid=2661 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:46.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:46.850447 env[1352]: time="2023-10-02T20:38:46.850408477Z" level=info msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.913 [INFO][4181] k8s.go 576: Cleaning up netns ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.913 [INFO][4181] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" iface="eth0" netns="/var/run/netns/cni-b01c00f7-ff96-e894-1293-2633cc53e0ec" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.913 [INFO][4181] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" iface="eth0" netns="/var/run/netns/cni-b01c00f7-ff96-e894-1293-2633cc53e0ec" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.914 [INFO][4181] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" iface="eth0" netns="/var/run/netns/cni-b01c00f7-ff96-e894-1293-2633cc53e0ec" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.914 [INFO][4181] k8s.go 583: Releasing IP address(es) ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.914 [INFO][4181] utils.go 196: Calico CNI releasing IP address ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.952 [INFO][4188] ipam_plugin.go 416: Releasing address using handleID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:46.965426 env[1352]: time="2023-10-02T20:38:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:46.965426 env[1352]: time="2023-10-02T20:38:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.962 [WARNING][4188] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.962 [INFO][4188] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:46.965426 env[1352]: time="2023-10-02T20:38:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:46.965426 env[1352]: 2023-10-02 20:38:46.964 [INFO][4181] k8s.go 589: Teardown processing complete. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:46.968245 env[1352]: time="2023-10-02T20:38:46.967881425Z" level=info msg="TearDown network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" successfully" Oct 2 20:38:46.968245 env[1352]: time="2023-10-02T20:38:46.967918505Z" level=info msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" returns successfully" Oct 2 20:38:46.967140 systemd[1]: run-netns-cni\x2db01c00f7\x2dff96\x2de894\x2d1293\x2d2633cc53e0ec.mount: Deactivated successfully. Oct 2 20:38:46.969165 env[1352]: time="2023-10-02T20:38:46.969139186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cvqct,Uid:2983186f-0606-454b-bfe8-ca00bb7b34c1,Namespace:calico-system,Attempt:1,}" Oct 2 20:38:47.159410 systemd-networkd[1500]: cali04d34bb95cb: Link UP Oct 2 20:38:47.172718 systemd-networkd[1500]: cali04d34bb95cb: Gained carrier Oct 2 20:38:47.173550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali04d34bb95cb: link becomes ready Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.059 [INFO][4194] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0 csi-node-driver- calico-system 2983186f-0606-454b-bfe8-ca00bb7b34c1 753 0 2023-10-02 20:38:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b csi-node-driver-cvqct eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali04d34bb95cb [] []}} ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.059 [INFO][4194] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.092 [INFO][4206] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" HandleID="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.104 [INFO][4206] ipam_plugin.go 269: Auto assigning IP ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" HandleID="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400041df30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"csi-node-driver-cvqct", "timestamp":"2023-10-02 20:38:47.092057536 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:47.195863 env[1352]: time="2023-10-02T20:38:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:47.195863 env[1352]: time="2023-10-02T20:38:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.104 [INFO][4206] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.106 [INFO][4206] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.117 [INFO][4206] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.128 [INFO][4206] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.130 [INFO][4206] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.132 [INFO][4206] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.132 [INFO][4206] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.136 [INFO][4206] ipam.go 1682: Creating new handle: k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181 Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.140 [INFO][4206] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.152 [INFO][4206] ipam.go 1216: Successfully claimed IPs: [192.168.97.196/26] block=192.168.97.192/26 handle="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.152 [INFO][4206] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.196/26] handle="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:47.195863 env[1352]: time="2023-10-02T20:38:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:47.195863 env[1352]: 2023-10-02 20:38:47.152 [INFO][4206] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.196/26] IPv6=[] ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" HandleID="k8s-pod-network.78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.153 [INFO][4194] k8s.go 383: Populated endpoint ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2983186f-0606-454b-bfe8-ca00bb7b34c1", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"csi-node-driver-cvqct", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali04d34bb95cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.153 [INFO][4194] k8s.go 384: Calico CNI using IPs: [192.168.97.196/32] ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.153 [INFO][4194] dataplane_linux.go 68: Setting the host side veth name to cali04d34bb95cb ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.154 [INFO][4194] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.159 [INFO][4194] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2983186f-0606-454b-bfe8-ca00bb7b34c1", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181", Pod:"csi-node-driver-cvqct", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali04d34bb95cb", MAC:"ba:05:d2:ef:44:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:47.196456 env[1352]: 2023-10-02 20:38:47.194 [INFO][4194] k8s.go 489: Wrote updated endpoint to datastore ContainerID="78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181" Namespace="calico-system" Pod="csi-node-driver-cvqct" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:47.233735 env[1352]: time="2023-10-02T20:38:47.233640258Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:47.233735 env[1352]: time="2023-10-02T20:38:47.233688738Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:47.233735 env[1352]: time="2023-10-02T20:38:47.233699138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:47.234336 env[1352]: time="2023-10-02T20:38:47.234295378Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181 pid=4234 runtime=io.containerd.runc.v2 Oct 2 20:38:47.253607 systemd[1]: Started cri-containerd-78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181.scope. Oct 2 20:38:47.261000 audit[4255]: NETFILTER_CFG table=filter:115 family=2 entries=48 op=nft_register_chain pid=4255 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:47.267366 kernel: kauditd_printk_skb: 365 callbacks suppressed Oct 2 20:38:47.267484 kernel: audit: type=1325 audit(1696279127.261:1297): table=filter:115 family=2 entries=48 op=nft_register_chain pid=4255 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:47.261000 audit[4255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23548 a0=3 a1=ffffc7b072b0 a2=0 a3=ffffa3c7afa0 items=0 ppid=3460 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.310399 kernel: audit: type=1300 audit(1696279127.261:1297): arch=c00000b7 syscall=211 success=yes exit=23548 a0=3 a1=ffffc7b072b0 a2=0 a3=ffffa3c7afa0 items=0 ppid=3460 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:47.326892 kernel: audit: type=1327 audit(1696279127.261:1297): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:47.327644 kernel: audit: type=1400 audit(1696279127.279:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.362642 kernel: audit: type=1400 audit(1696279127.279:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.380350 kernel: audit: type=1400 audit(1696279127.279:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.399663 kernel: audit: type=1400 audit(1696279127.279:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.401307 env[1352]: time="2023-10-02T20:38:47.401274714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cvqct,Uid:2983186f-0606-454b-bfe8-ca00bb7b34c1,Namespace:calico-system,Attempt:1,} returns sandbox id \"78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181\"" Oct 2 20:38:47.405184 env[1352]: time="2023-10-02T20:38:47.405143076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:38:47.418854 kernel: audit: type=1400 audit(1696279127.279:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.419739 kernel: audit: type=1400 audit(1696279127.279:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.456256 kernel: audit: type=1400 audit(1696279127.279:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit: BPF prog-id=176 op=LOAD Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4234 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343237653065623339333331323761306437663265396433643361 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4234 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343237653065623339333331323761306437663265396433643361 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit: BPF prog-id=177 op=LOAD Oct 2 20:38:47.281000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4234 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343237653065623339333331323761306437663265396433643361 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit: BPF prog-id=178 op=LOAD Oct 2 20:38:47.281000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4234 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343237653065623339333331323761306437663265396433643361 Oct 2 20:38:47.281000 audit: BPF prog-id=178 op=UNLOAD Oct 2 20:38:47.281000 audit: BPF prog-id=177 op=UNLOAD Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:47.281000 audit: BPF prog-id=179 op=LOAD Oct 2 20:38:47.281000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4234 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:47.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343237653065623339333331323761306437663265396433643361 Oct 2 20:38:47.610193 env[1352]: time="2023-10-02T20:38:47.610136913Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:47.613830 env[1352]: time="2023-10-02T20:38:47.613785795Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:47.614556 kubelet[2488]: E1002 20:38:47.614177 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:47.614556 kubelet[2488]: E1002 20:38:47.614231 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:38:47.614964 kubelet[2488]: E1002 20:38:47.614336 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:47.616863 env[1352]: time="2023-10-02T20:38:47.615445836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:38:47.770945 env[1352]: time="2023-10-02T20:38:47.768983804Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:47.775983 env[1352]: time="2023-10-02T20:38:47.775940848Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:47.776315 kubelet[2488]: E1002 20:38:47.776287 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:47.776397 kubelet[2488]: E1002 20:38:47.776327 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:38:47.776428 kubelet[2488]: E1002 20:38:47.776413 2488 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:47.776513 kubelet[2488]: E1002 20:38:47.776461 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:38:47.967216 systemd[1]: run-containerd-runc-k8s.io-78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181-runc.189WTf.mount: Deactivated successfully. Oct 2 20:38:48.039896 kubelet[2488]: E1002 20:38:48.039332 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:38:48.576645 systemd-networkd[1500]: cali04d34bb95cb: Gained IPv6LL Oct 2 20:38:48.802717 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.16ln96.mount: Deactivated successfully. Oct 2 20:38:49.039620 kubelet[2488]: E1002 20:38:49.039581 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:38:50.484063 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.QwCtGW.mount: Deactivated successfully. Oct 2 20:38:51.720261 kubelet[2488]: I1002 20:38:51.720218 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:51.725661 systemd[1]: Created slice kubepods-besteffort-pod77d8a75c_7e22_4697_890d_7260308ce095.slice. Oct 2 20:38:51.759815 kubelet[2488]: I1002 20:38:51.759779 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/77d8a75c-7e22-4697-890d-7260308ce095-calico-apiserver-certs\") pod \"calico-apiserver-54f56cbb4f-nggnv\" (UID: \"77d8a75c-7e22-4697-890d-7260308ce095\") " pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" Oct 2 20:38:51.760100 kubelet[2488]: I1002 20:38:51.760083 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7qx9\" (UniqueName: \"kubernetes.io/projected/77d8a75c-7e22-4697-890d-7260308ce095-kube-api-access-t7qx9\") pod \"calico-apiserver-54f56cbb4f-nggnv\" (UID: \"77d8a75c-7e22-4697-890d-7260308ce095\") " pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" Oct 2 20:38:51.773509 kubelet[2488]: I1002 20:38:51.773362 2488 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:38:51.780151 systemd[1]: Created slice kubepods-besteffort-poda42a3025_5a96_4b68_98d0_af5cda9868b4.slice. Oct 2 20:38:51.830000 audit[4316]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.830000 audit[4316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe36ba300 a2=0 a3=ffffba2aa6c0 items=0 ppid=2661 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.831000 audit[4316]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.831000 audit[4316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe36ba300 a2=0 a3=ffffba2aa6c0 items=0 ppid=2661 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.841000 audit[4318]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.841000 audit[4318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd684d740 a2=0 a3=ffff8b4276c0 items=0 ppid=2661 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.842000 audit[4318]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:51.842000 audit[4318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd684d740 a2=0 a3=ffff8b4276c0 items=0 ppid=2661 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:51.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:51.860553 kubelet[2488]: E1002 20:38:51.860506 2488 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 20:38:51.860686 kubelet[2488]: E1002 20:38:51.860595 2488 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/77d8a75c-7e22-4697-890d-7260308ce095-calico-apiserver-certs podName:77d8a75c-7e22-4697-890d-7260308ce095 nodeName:}" failed. No retries permitted until 2023-10-02 20:38:52.360577604 +0000 UTC m=+55.676724889 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/77d8a75c-7e22-4697-890d-7260308ce095-calico-apiserver-certs") pod "calico-apiserver-54f56cbb4f-nggnv" (UID: "77d8a75c-7e22-4697-890d-7260308ce095") : secret "calico-apiserver-certs" not found Oct 2 20:38:51.860973 kubelet[2488]: I1002 20:38:51.860424 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a42a3025-5a96-4b68-98d0-af5cda9868b4-calico-apiserver-certs\") pod \"calico-apiserver-54f56cbb4f-c2qqs\" (UID: \"a42a3025-5a96-4b68-98d0-af5cda9868b4\") " pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" Oct 2 20:38:51.861045 kubelet[2488]: I1002 20:38:51.860992 2488 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bdsgn\" (UniqueName: \"kubernetes.io/projected/a42a3025-5a96-4b68-98d0-af5cda9868b4-kube-api-access-bdsgn\") pod \"calico-apiserver-54f56cbb4f-c2qqs\" (UID: \"a42a3025-5a96-4b68-98d0-af5cda9868b4\") " pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" Oct 2 20:38:52.087090 env[1352]: time="2023-10-02T20:38:52.087051047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f56cbb4f-c2qqs,Uid:a42a3025-5a96-4b68-98d0-af5cda9868b4,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:52.256286 systemd-networkd[1500]: cali9bbc3e36b02: Link UP Oct 2 20:38:52.263598 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9bbc3e36b02: link becomes ready Oct 2 20:38:52.263746 systemd-networkd[1500]: cali9bbc3e36b02: Gained carrier Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.165 [INFO][4323] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0 calico-apiserver-54f56cbb4f- calico-apiserver a42a3025-5a96-4b68-98d0-af5cda9868b4 827 0 2023-10-02 20:38:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f56cbb4f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b calico-apiserver-54f56cbb4f-c2qqs eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9bbc3e36b02 [] []}} ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.165 [INFO][4323] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.208 [INFO][4334] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" HandleID="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.220 [INFO][4334] ipam_plugin.go 269: Auto assigning IP ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" HandleID="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d2e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"calico-apiserver-54f56cbb4f-c2qqs", "timestamp":"2023-10-02 20:38:52.208669633 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:52.272055 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:52.272055 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.220 [INFO][4334] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.221 [INFO][4334] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.225 [INFO][4334] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.230 [INFO][4334] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.231 [INFO][4334] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.233 [INFO][4334] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.233 [INFO][4334] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.235 [INFO][4334] ipam.go 1682: Creating new handle: k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.238 [INFO][4334] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.247 [INFO][4334] ipam.go 1216: Successfully claimed IPs: [192.168.97.197/26] block=192.168.97.192/26 handle="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.247 [INFO][4334] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.197/26] handle="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.272055 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:52.272055 env[1352]: 2023-10-02 20:38:52.247 [INFO][4334] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.197/26] IPv6=[] ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" HandleID="k8s-pod-network.5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.248 [INFO][4323] k8s.go 383: Populated endpoint ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0", GenerateName:"calico-apiserver-54f56cbb4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a42a3025-5a96-4b68-98d0-af5cda9868b4", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f56cbb4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"calico-apiserver-54f56cbb4f-c2qqs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.97.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9bbc3e36b02", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.248 [INFO][4323] k8s.go 384: Calico CNI using IPs: [192.168.97.197/32] ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.248 [INFO][4323] dataplane_linux.go 68: Setting the host side veth name to cali9bbc3e36b02 ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.249 [INFO][4323] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.264 [INFO][4323] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0", GenerateName:"calico-apiserver-54f56cbb4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a42a3025-5a96-4b68-98d0-af5cda9868b4", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f56cbb4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff", Pod:"calico-apiserver-54f56cbb4f-c2qqs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.97.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9bbc3e36b02", MAC:"d6:71:e0:02:e1:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.272629 env[1352]: 2023-10-02 20:38:52.270 [INFO][4323] k8s.go 489: Wrote updated endpoint to datastore ContainerID="5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-c2qqs" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--c2qqs-eth0" Oct 2 20:38:52.295841 env[1352]: time="2023-10-02T20:38:52.295763040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:52.295977 env[1352]: time="2023-10-02T20:38:52.295848400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:52.295977 env[1352]: time="2023-10-02T20:38:52.295876960Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:52.296057 env[1352]: time="2023-10-02T20:38:52.296018240Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff pid=4361 runtime=io.containerd.runc.v2 Oct 2 20:38:52.310741 systemd[1]: Started cri-containerd-5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff.scope. Oct 2 20:38:52.339631 kernel: kauditd_printk_skb: 62 callbacks suppressed Oct 2 20:38:52.339753 kernel: audit: type=1400 audit(1696279132.332:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.375438 kernel: audit: type=1400 audit(1696279132.332:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.398039 kernel: audit: type=1400 audit(1696279132.332:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.420251 kernel: audit: type=1400 audit(1696279132.332:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.439035 kernel: audit: type=1400 audit(1696279132.332:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.439848 env[1352]: time="2023-10-02T20:38:52.439802757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f56cbb4f-c2qqs,Uid:a42a3025-5a96-4b68-98d0-af5cda9868b4,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"5fc1bc5578d496ced3ee0e9eae4caab54c8a623059170dc34ede31b1f003dfff\"" Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.457811 kernel: audit: type=1400 audit(1696279132.332:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.461622 env[1352]: time="2023-10-02T20:38:52.461589489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:52.476542 kernel: audit: type=1400 audit(1696279132.332:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.477346 kernel: audit: type=1400 audit(1696279132.332:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.517618 kernel: audit: type=1400 audit(1696279132.332:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.517740 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:38:52.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.337000 audit: BPF prog-id=180 op=LOAD Oct 2 20:38:52.339000 audit[4392]: NETFILTER_CFG table=filter:120 family=2 entries=55 op=nft_register_chain pid=4392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:52.339000 audit[4392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffc4b46780 a2=0 a3=ffff82ab7fa0 items=0 ppid=3460 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.339000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4361 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633162633535373864343936636564336565306539656165346361 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4361 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633162633535373864343936636564336565306539656165346361 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit: BPF prog-id=181 op=LOAD Oct 2 20:38:52.355000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4361 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633162633535373864343936636564336565306539656165346361 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit: BPF prog-id=182 op=LOAD Oct 2 20:38:52.355000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4361 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633162633535373864343936636564336565306539656165346361 Oct 2 20:38:52.355000 audit: BPF prog-id=182 op=UNLOAD Oct 2 20:38:52.355000 audit: BPF prog-id=181 op=UNLOAD Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.355000 audit: BPF prog-id=183 op=LOAD Oct 2 20:38:52.355000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4361 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633162633535373864343936636564336565306539656165346361 Oct 2 20:38:52.504000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:52.504000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400667a750 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:38:52.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:52.505000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:52.505000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4009ac9c60 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:38:52.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:52.530000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:52.530000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:52.530000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009ac9c80 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:38:52.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:52.530000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400667a990 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:38:52.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:52.531000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:52.531000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4003c3f2f0 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:38:52.531000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:38:52.630348 env[1352]: time="2023-10-02T20:38:52.628871500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f56cbb4f-nggnv,Uid:77d8a75c-7e22-4697-890d-7260308ce095,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:38:52.657091 env[1352]: time="2023-10-02T20:38:52.657031235Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:52.678423 env[1352]: time="2023-10-02T20:38:52.678374246Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:52.679768 kubelet[2488]: E1002 20:38:52.678747 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:52.679768 kubelet[2488]: E1002 20:38:52.678784 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:52.679768 kubelet[2488]: E1002 20:38:52.678884 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bdsgn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-c2qqs_calico-apiserver(a42a3025-5a96-4b68-98d0-af5cda9868b4): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:52.679768 kubelet[2488]: E1002 20:38:52.678918 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:38:52.825558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic7df3862521: link becomes ready Oct 2 20:38:52.837312 systemd-networkd[1500]: calic7df3862521: Link UP Oct 2 20:38:52.837319 systemd-networkd[1500]: calic7df3862521: Gained carrier Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.748 [INFO][4399] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0 calico-apiserver-54f56cbb4f- calico-apiserver 77d8a75c-7e22-4697-890d-7260308ce095 823 0 2023-10-02 20:38:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f56cbb4f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-96ab8c487b calico-apiserver-54f56cbb4f-nggnv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic7df3862521 [] []}} ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.748 [INFO][4399] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.780 [INFO][4411] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" HandleID="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.792 [INFO][4411] ipam_plugin.go 269: Auto assigning IP ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" HandleID="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004db00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-96ab8c487b", "pod":"calico-apiserver-54f56cbb4f-nggnv", "timestamp":"2023-10-02 20:38:52.780144781 +0000 UTC"}, Hostname:"ci-3510.3.0-a-96ab8c487b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:38:52.852570 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:52.852570 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.792 [INFO][4411] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-96ab8c487b' Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.793 [INFO][4411] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.797 [INFO][4411] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.801 [INFO][4411] ipam.go 489: Trying affinity for 192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.802 [INFO][4411] ipam.go 155: Attempting to load block cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.804 [INFO][4411] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.192/26 host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.804 [INFO][4411] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.192/26 handle="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.806 [INFO][4411] ipam.go 1682: Creating new handle: k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.810 [INFO][4411] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.192/26 handle="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.816 [INFO][4411] ipam.go 1216: Successfully claimed IPs: [192.168.97.198/26] block=192.168.97.192/26 handle="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.816 [INFO][4411] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.198/26] handle="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" host="ci-3510.3.0-a-96ab8c487b" Oct 2 20:38:52.852570 env[1352]: time="2023-10-02T20:38:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:52.852570 env[1352]: 2023-10-02 20:38:52.816 [INFO][4411] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.97.198/26] IPv6=[] ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" HandleID="k8s-pod-network.14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.817 [INFO][4399] k8s.go 383: Populated endpoint ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0", GenerateName:"calico-apiserver-54f56cbb4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"77d8a75c-7e22-4697-890d-7260308ce095", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f56cbb4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"", Pod:"calico-apiserver-54f56cbb4f-nggnv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.97.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic7df3862521", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.817 [INFO][4399] k8s.go 384: Calico CNI using IPs: [192.168.97.198/32] ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.818 [INFO][4399] dataplane_linux.go 68: Setting the host side veth name to calic7df3862521 ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.825 [INFO][4399] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.837 [INFO][4399] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0", GenerateName:"calico-apiserver-54f56cbb4f-", Namespace:"calico-apiserver", SelfLink:"", UID:"77d8a75c-7e22-4697-890d-7260308ce095", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f56cbb4f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df", Pod:"calico-apiserver-54f56cbb4f-nggnv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.97.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic7df3862521", MAC:"0e:cc:cc:8e:f2:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:52.853078 env[1352]: 2023-10-02 20:38:52.846 [INFO][4399] k8s.go 489: Wrote updated endpoint to datastore ContainerID="14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df" Namespace="calico-apiserver" Pod="calico-apiserver-54f56cbb4f-nggnv" WorkloadEndpoint="ci--3510.3.0--a--96ab8c487b-k8s-calico--apiserver--54f56cbb4f--nggnv-eth0" Oct 2 20:38:52.882000 audit[4433]: NETFILTER_CFG table=filter:121 family=2 entries=46 op=nft_register_chain pid=4433 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:38:52.882000 audit[4433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23292 a0=3 a1=ffffc29ea930 a2=0 a3=ffff90f22fa0 items=0 ppid=3460 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.882000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:38:52.887144 env[1352]: time="2023-10-02T20:38:52.887074839Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:38:52.887364 env[1352]: time="2023-10-02T20:38:52.887114039Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:38:52.887364 env[1352]: time="2023-10-02T20:38:52.887125159Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:38:52.887806 env[1352]: time="2023-10-02T20:38:52.887754119Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df pid=4436 runtime=io.containerd.runc.v2 Oct 2 20:38:52.906773 systemd[1]: Started cri-containerd-14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df.scope. Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit: BPF prog-id=184 op=LOAD Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4436 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613232626334326637636462373039346366326633386663393032 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4436 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613232626334326637636462373039346366326633386663393032 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit: BPF prog-id=185 op=LOAD Oct 2 20:38:52.927000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4436 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613232626334326637636462373039346366326633386663393032 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit: BPF prog-id=186 op=LOAD Oct 2 20:38:52.927000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4436 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613232626334326637636462373039346366326633386663393032 Oct 2 20:38:52.927000 audit: BPF prog-id=186 op=UNLOAD Oct 2 20:38:52.927000 audit: BPF prog-id=185 op=UNLOAD Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:38:52.927000 audit: BPF prog-id=187 op=LOAD Oct 2 20:38:52.927000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4436 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:52.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613232626334326637636462373039346366326633386663393032 Oct 2 20:38:52.953426 env[1352]: time="2023-10-02T20:38:52.953377835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f56cbb4f-nggnv,Uid:77d8a75c-7e22-4697-890d-7260308ce095,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"14a22bc42f7cdb7094cf2f38fc9028612ab66e41d6d4be9346ce27ce543f63df\"" Oct 2 20:38:52.955503 env[1352]: time="2023-10-02T20:38:52.955178796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:38:53.050130 kubelet[2488]: E1002 20:38:53.050088 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:38:53.073000 audit[4471]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.073000 audit[4471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc8075440 a2=0 a3=ffffbad7e6c0 items=0 ppid=2661 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:53.074000 audit[4471]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:53.074000 audit[4471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc8075440 a2=0 a3=ffffbad7e6c0 items=0 ppid=2661 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:53.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:53.106141 env[1352]: time="2023-10-02T20:38:53.106082557Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:38:53.109975 env[1352]: time="2023-10-02T20:38:53.109924759Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:38:53.110488 kubelet[2488]: E1002 20:38:53.110271 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.110488 kubelet[2488]: E1002 20:38:53.110308 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:38:53.110488 kubelet[2488]: E1002 20:38:53.110420 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t7qx9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-nggnv_calico-apiserver(77d8a75c-7e22-4697-890d-7260308ce095): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:38:53.110488 kubelet[2488]: E1002 20:38:53.110455 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:38:53.228000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:53.228000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f61080 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:53.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:53.228000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:38:53.228000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011f98c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:38:53.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:38:53.760694 systemd-networkd[1500]: cali9bbc3e36b02: Gained IPv6LL Oct 2 20:38:54.050117 kubelet[2488]: E1002 20:38:54.050013 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:38:54.050368 kubelet[2488]: E1002 20:38:54.050270 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:38:54.084000 audit[4475]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:54.084000 audit[4475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffccf1d940 a2=0 a3=ffffab5026c0 items=0 ppid=2661 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:54.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:54.086000 audit[4475]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:38:54.086000 audit[4475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffccf1d940 a2=0 a3=ffffab5026c0 items=0 ppid=2661 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:38:54.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:38:54.592731 systemd-networkd[1500]: calic7df3862521: Gained IPv6LL Oct 2 20:38:56.831686 env[1352]: time="2023-10-02T20:38:56.831648916Z" level=info msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.879 [WARNING][4496] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"19346e89-5378-4f48-a994-157b505e679d", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499", Pod:"coredns-5d78c9869d-whh7w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02c69b8f90f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.880 [INFO][4496] k8s.go 576: Cleaning up netns ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.880 [INFO][4496] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" iface="eth0" netns="" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.880 [INFO][4496] k8s.go 583: Releasing IP address(es) ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.880 [INFO][4496] utils.go 196: Calico CNI releasing IP address ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.915 [INFO][4504] ipam_plugin.go 416: Releasing address using handleID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:56.928387 env[1352]: time="2023-10-02T20:38:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:56.928387 env[1352]: time="2023-10-02T20:38:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.924 [WARNING][4504] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.924 [INFO][4504] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:56.928387 env[1352]: time="2023-10-02T20:38:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:56.928387 env[1352]: 2023-10-02 20:38:56.927 [INFO][4496] k8s.go 589: Teardown processing complete. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:56.928830 env[1352]: time="2023-10-02T20:38:56.928661966Z" level=info msg="TearDown network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" successfully" Oct 2 20:38:56.928830 env[1352]: time="2023-10-02T20:38:56.928703526Z" level=info msg="StopPodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" returns successfully" Oct 2 20:38:56.929640 env[1352]: time="2023-10-02T20:38:56.929289687Z" level=info msg="RemovePodSandbox for \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" Oct 2 20:38:56.929640 env[1352]: time="2023-10-02T20:38:56.929340047Z" level=info msg="Forcibly stopping sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\"" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:56.981 [WARNING][4524] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"19346e89-5378-4f48-a994-157b505e679d", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"6770565da71a97841a31b1dad38c4813e66551e3ffc8f4088a3c6b7309255499", Pod:"coredns-5d78c9869d-whh7w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02c69b8f90f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:56.982 [INFO][4524] k8s.go 576: Cleaning up netns ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:56.982 [INFO][4524] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" iface="eth0" netns="" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:56.982 [INFO][4524] k8s.go 583: Releasing IP address(es) ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:56.982 [INFO][4524] utils.go 196: Calico CNI releasing IP address ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:57.011 [INFO][4531] ipam_plugin.go 416: Releasing address using handleID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:57.039449 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.039449 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:57.028 [WARNING][4531] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:57.028 [INFO][4531] ipam_plugin.go 444: Releasing address using workloadID ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" HandleID="k8s-pod-network.5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--whh7w-eth0" Oct 2 20:38:57.039449 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.039449 env[1352]: 2023-10-02 20:38:57.038 [INFO][4524] k8s.go 589: Teardown processing complete. ContainerID="5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85" Oct 2 20:38:57.039894 env[1352]: time="2023-10-02T20:38:57.039477264Z" level=info msg="TearDown network for sandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" successfully" Oct 2 20:38:57.046047 env[1352]: time="2023-10-02T20:38:57.046003747Z" level=info msg="RemovePodSandbox \"5157f2217227f1963bb4480314cd6f79c0ec0b6f503d54efd1eef0ef1923ce85\" returns successfully" Oct 2 20:38:57.046569 env[1352]: time="2023-10-02T20:38:57.046538147Z" level=info msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.092 [WARNING][4550] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"71736582-5e3a-4026-bc6f-1b186295cd84", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840", Pod:"coredns-5d78c9869d-gvfts", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79bfb72d8f1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.093 [INFO][4550] k8s.go 576: Cleaning up netns ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.093 [INFO][4550] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" iface="eth0" netns="" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.093 [INFO][4550] k8s.go 583: Releasing IP address(es) ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.093 [INFO][4550] utils.go 196: Calico CNI releasing IP address ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.120 [INFO][4557] ipam_plugin.go 416: Releasing address using handleID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.132903 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.132903 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.129 [WARNING][4557] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.129 [INFO][4557] ipam_plugin.go 444: Releasing address using workloadID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.132903 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.132903 env[1352]: 2023-10-02 20:38:57.131 [INFO][4550] k8s.go 589: Teardown processing complete. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.133427 env[1352]: time="2023-10-02T20:38:57.132928511Z" level=info msg="TearDown network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" successfully" Oct 2 20:38:57.133427 env[1352]: time="2023-10-02T20:38:57.132960471Z" level=info msg="StopPodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" returns successfully" Oct 2 20:38:57.133709 env[1352]: time="2023-10-02T20:38:57.133676552Z" level=info msg="RemovePodSandbox for \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" Oct 2 20:38:57.133752 env[1352]: time="2023-10-02T20:38:57.133713952Z" level=info msg="Forcibly stopping sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\"" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.178 [WARNING][4576] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"71736582-5e3a-4026-bc6f-1b186295cd84", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"e99209ff843043c62aa0be2f147c92a3e6cc26ee0ad2fdb7e52394b3ff321840", Pod:"coredns-5d78c9869d-gvfts", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.97.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79bfb72d8f1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.179 [INFO][4576] k8s.go 576: Cleaning up netns ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.179 [INFO][4576] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" iface="eth0" netns="" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.179 [INFO][4576] k8s.go 583: Releasing IP address(es) ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.179 [INFO][4576] utils.go 196: Calico CNI releasing IP address ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.206 [INFO][4582] ipam_plugin.go 416: Releasing address using handleID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.223069 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.223069 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.216 [WARNING][4582] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.216 [INFO][4582] ipam_plugin.go 444: Releasing address using workloadID ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" HandleID="k8s-pod-network.05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Workload="ci--3510.3.0--a--96ab8c487b-k8s-coredns--5d78c9869d--gvfts-eth0" Oct 2 20:38:57.223069 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.223069 env[1352]: 2023-10-02 20:38:57.222 [INFO][4576] k8s.go 589: Teardown processing complete. ContainerID="05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a" Oct 2 20:38:57.223531 env[1352]: time="2023-10-02T20:38:57.223088718Z" level=info msg="TearDown network for sandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" successfully" Oct 2 20:38:57.250425 env[1352]: time="2023-10-02T20:38:57.250378172Z" level=info msg="RemovePodSandbox \"05d4e83e9146ac51ef475e9688c51fb4fc319b03199a56c7991c60be40c6998a\" returns successfully" Oct 2 20:38:57.250908 env[1352]: time="2023-10-02T20:38:57.250885452Z" level=info msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.294 [WARNING][4601] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2983186f-0606-454b-bfe8-ca00bb7b34c1", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181", Pod:"csi-node-driver-cvqct", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali04d34bb95cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.294 [INFO][4601] k8s.go 576: Cleaning up netns ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.294 [INFO][4601] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" iface="eth0" netns="" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.295 [INFO][4601] k8s.go 583: Releasing IP address(es) ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.295 [INFO][4601] utils.go 196: Calico CNI releasing IP address ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.319 [INFO][4608] ipam_plugin.go 416: Releasing address using handleID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.332400 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.332400 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.328 [WARNING][4608] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.329 [INFO][4608] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.332400 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.332400 env[1352]: 2023-10-02 20:38:57.331 [INFO][4601] k8s.go 589: Teardown processing complete. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.332924 env[1352]: time="2023-10-02T20:38:57.332877974Z" level=info msg="TearDown network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" successfully" Oct 2 20:38:57.332998 env[1352]: time="2023-10-02T20:38:57.332983254Z" level=info msg="StopPodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" returns successfully" Oct 2 20:38:57.333668 env[1352]: time="2023-10-02T20:38:57.333637414Z" level=info msg="RemovePodSandbox for \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" Oct 2 20:38:57.333756 env[1352]: time="2023-10-02T20:38:57.333675094Z" level=info msg="Forcibly stopping sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\"" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.378 [WARNING][4626] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2983186f-0606-454b-bfe8-ca00bb7b34c1", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"78427e0eb3933127a0d7f2e9d3d3a67b623e9dab3ae79d39d06f8b9f08b84181", Pod:"csi-node-driver-cvqct", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali04d34bb95cb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.379 [INFO][4626] k8s.go 576: Cleaning up netns ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.379 [INFO][4626] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" iface="eth0" netns="" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.379 [INFO][4626] k8s.go 583: Releasing IP address(es) ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.379 [INFO][4626] utils.go 196: Calico CNI releasing IP address ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.405 [INFO][4632] ipam_plugin.go 416: Releasing address using handleID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.419661 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.419661 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.415 [WARNING][4632] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.415 [INFO][4632] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" HandleID="k8s-pod-network.dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Workload="ci--3510.3.0--a--96ab8c487b-k8s-csi--node--driver--cvqct-eth0" Oct 2 20:38:57.419661 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.419661 env[1352]: 2023-10-02 20:38:57.417 [INFO][4626] k8s.go 589: Teardown processing complete. ContainerID="dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda" Oct 2 20:38:57.419661 env[1352]: time="2023-10-02T20:38:57.418672298Z" level=info msg="TearDown network for sandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" successfully" Oct 2 20:38:57.424574 env[1352]: time="2023-10-02T20:38:57.424516341Z" level=info msg="RemovePodSandbox \"dfcd808aaf98257a6c9be9a434900d04c3c4d803af20d2c1daab5679708f8dda\" returns successfully" Oct 2 20:38:57.425096 env[1352]: time="2023-10-02T20:38:57.425064661Z" level=info msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.469 [WARNING][4650] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"9e59910b-3872-4ac4-99cf-4b35292d9dd2", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc", Pod:"calico-kube-controllers-7bd445fdb4-v9p4h", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.97.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8eecb820b73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.469 [INFO][4650] k8s.go 576: Cleaning up netns ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.469 [INFO][4650] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" iface="eth0" netns="" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.469 [INFO][4650] k8s.go 583: Releasing IP address(es) ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.469 [INFO][4650] utils.go 196: Calico CNI releasing IP address ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.495 [INFO][4657] ipam_plugin.go 416: Releasing address using handleID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.508329 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.508329 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.504 [WARNING][4657] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.504 [INFO][4657] ipam_plugin.go 444: Releasing address using workloadID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.508329 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.508329 env[1352]: 2023-10-02 20:38:57.507 [INFO][4650] k8s.go 589: Teardown processing complete. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.508785 env[1352]: time="2023-10-02T20:38:57.508354224Z" level=info msg="TearDown network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" successfully" Oct 2 20:38:57.508785 env[1352]: time="2023-10-02T20:38:57.508384224Z" level=info msg="StopPodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" returns successfully" Oct 2 20:38:57.509046 env[1352]: time="2023-10-02T20:38:57.509005944Z" level=info msg="RemovePodSandbox for \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" Oct 2 20:38:57.509098 env[1352]: time="2023-10-02T20:38:57.509055264Z" level=info msg="Forcibly stopping sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\"" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.552 [WARNING][4676] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"9e59910b-3872-4ac4-99cf-4b35292d9dd2", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-96ab8c487b", ContainerID:"55e9e7adbe9cfd74dffaab13ed2507d50e40f81d666d525d204ca680867290bc", Pod:"calico-kube-controllers-7bd445fdb4-v9p4h", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.97.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8eecb820b73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.553 [INFO][4676] k8s.go 576: Cleaning up netns ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.553 [INFO][4676] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" iface="eth0" netns="" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.553 [INFO][4676] k8s.go 583: Releasing IP address(es) ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.553 [INFO][4676] utils.go 196: Calico CNI releasing IP address ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.578 [INFO][4682] ipam_plugin.go 416: Releasing address using handleID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.591777 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:38:57.591777 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.588 [WARNING][4682] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.588 [INFO][4682] ipam_plugin.go 444: Releasing address using workloadID ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" HandleID="k8s-pod-network.675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Workload="ci--3510.3.0--a--96ab8c487b-k8s-calico--kube--controllers--7bd445fdb4--v9p4h-eth0" Oct 2 20:38:57.591777 env[1352]: time="2023-10-02T20:38:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:38:57.591777 env[1352]: 2023-10-02 20:38:57.590 [INFO][4676] k8s.go 589: Teardown processing complete. ContainerID="675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698" Oct 2 20:38:57.592425 env[1352]: time="2023-10-02T20:38:57.592383267Z" level=info msg="TearDown network for sandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" successfully" Oct 2 20:38:57.600729 env[1352]: time="2023-10-02T20:38:57.600691911Z" level=info msg="RemovePodSandbox \"675d3bccc618e623161198450b2c249c705bb565ee0682ca7400833f185d7698\" returns successfully" Oct 2 20:38:58.783805 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.2QAVzR.mount: Deactivated successfully. Oct 2 20:39:00.486047 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.h4XSLW.mount: Deactivated successfully. Oct 2 20:39:01.480727 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.CVo7Zu.mount: Deactivated successfully. Oct 2 20:39:01.850831 env[1352]: time="2023-10-02T20:39:01.850788363Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:39:01.998334 env[1352]: time="2023-10-02T20:39:01.998276636Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:02.000868 env[1352]: time="2023-10-02T20:39:02.000824557Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:02.001117 kubelet[2488]: E1002 20:39:02.001092 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:02.001375 kubelet[2488]: E1002 20:39:02.001135 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:02.001375 kubelet[2488]: E1002 20:39:02.001231 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:02.002210 env[1352]: time="2023-10-02T20:39:02.002185518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:39:02.149655 env[1352]: time="2023-10-02T20:39:02.149516070Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:02.151783 env[1352]: time="2023-10-02T20:39:02.151741031Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:02.152000 kubelet[2488]: E1002 20:39:02.151969 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:02.152068 kubelet[2488]: E1002 20:39:02.152010 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:02.152104 kubelet[2488]: E1002 20:39:02.152093 2488 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:02.152179 kubelet[2488]: E1002 20:39:02.152141 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:39:07.187000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.192931 kernel: kauditd_printk_skb: 146 callbacks suppressed Oct 2 20:39:07.193021 kernel: audit: type=1400 audit(1696279147.187:1369): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.187000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.237032 kernel: audit: type=1400 audit(1696279147.187:1370): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.237194 kernel: audit: type=1300 audit(1696279147.187:1370): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400084d580 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.187000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400084d580 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.291396 kernel: audit: type=1327 audit(1696279147.187:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.187000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.187000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400084d5a0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.343730 kernel: audit: type=1400 audit(1696279147.187:1371): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.343821 kernel: audit: type=1300 audit(1696279147.187:1371): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400084d5a0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.367682 kernel: audit: type=1327 audit(1696279147.187:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.187000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c67a40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.397279 kernel: audit: type=1300 audit(1696279147.187:1369): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c67a40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.422730 kernel: audit: type=1327 audit(1696279147.187:1369): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.422833 kernel: audit: type=1400 audit(1696279147.191:1372): avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.191000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:07.191000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c67a60 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:07.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:07.850858 env[1352]: time="2023-10-02T20:39:07.850823997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:08.006151 env[1352]: time="2023-10-02T20:39:08.006081110Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:08.008631 env[1352]: time="2023-10-02T20:39:08.008579151Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:08.008982 kubelet[2488]: E1002 20:39:08.008955 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:08.009283 kubelet[2488]: E1002 20:39:08.008997 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:08.009283 kubelet[2488]: E1002 20:39:08.009097 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t7qx9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-nggnv_calico-apiserver(77d8a75c-7e22-4697-890d-7260308ce095): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:08.009283 kubelet[2488]: E1002 20:39:08.009134 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:39:08.786351 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.DBADYo.mount: Deactivated successfully. Oct 2 20:39:08.852272 env[1352]: time="2023-10-02T20:39:08.852226063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:09.014639 env[1352]: time="2023-10-02T20:39:09.014587738Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:09.018206 env[1352]: time="2023-10-02T20:39:09.018168740Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:09.019102 kubelet[2488]: E1002 20:39:09.018512 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:09.019102 kubelet[2488]: E1002 20:39:09.018565 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:09.019102 kubelet[2488]: E1002 20:39:09.018999 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bdsgn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-c2qqs_calico-apiserver(a42a3025-5a96-4b68-98d0-af5cda9868b4): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:09.019102 kubelet[2488]: E1002 20:39:09.019059 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:39:10.484435 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.Wh7sgF.mount: Deactivated successfully. Oct 2 20:39:11.479734 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.zrStnt.mount: Deactivated successfully. Oct 2 20:39:12.853434 kubelet[2488]: E1002 20:39:12.853101 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:39:18.786033 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.qpdAw8.mount: Deactivated successfully. Oct 2 20:39:20.486187 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.tWgUus.mount: Deactivated successfully. Oct 2 20:39:20.850366 kubelet[2488]: E1002 20:39:20.850325 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:39:21.480027 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.I44sF4.mount: Deactivated successfully. Oct 2 20:39:22.850901 kubelet[2488]: E1002 20:39:22.850870 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:39:24.850646 env[1352]: time="2023-10-02T20:39:24.850601051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:39:25.013557 env[1352]: time="2023-10-02T20:39:25.013396759Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:25.016170 env[1352]: time="2023-10-02T20:39:25.016120840Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:25.016382 kubelet[2488]: E1002 20:39:25.016362 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:25.016720 kubelet[2488]: E1002 20:39:25.016708 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:39:25.016893 kubelet[2488]: E1002 20:39:25.016879 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:25.017930 env[1352]: time="2023-10-02T20:39:25.017901041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:39:25.186350 env[1352]: time="2023-10-02T20:39:25.186212231Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:25.189654 env[1352]: time="2023-10-02T20:39:25.189584753Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:25.189894 kubelet[2488]: E1002 20:39:25.189864 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:25.189967 kubelet[2488]: E1002 20:39:25.189908 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:39:25.190033 kubelet[2488]: E1002 20:39:25.190014 2488 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:25.190131 kubelet[2488]: E1002 20:39:25.190066 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:39:28.783384 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.SZ7E8h.mount: Deactivated successfully. Oct 2 20:39:29.845562 update_engine[1342]: I1002 20:39:29.844980 1342 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Oct 2 20:39:29.845562 update_engine[1342]: I1002 20:39:29.845027 1342 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Oct 2 20:39:29.845562 update_engine[1342]: I1002 20:39:29.845201 1342 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Oct 2 20:39:29.845562 update_engine[1342]: I1002 20:39:29.845506 1342 omaha_request_params.cc:62] Current group set to lts Oct 2 20:39:29.845951 update_engine[1342]: I1002 20:39:29.845638 1342 update_attempter.cc:495] Already updated boot flags. Skipping. Oct 2 20:39:29.845951 update_engine[1342]: I1002 20:39:29.845643 1342 update_attempter.cc:638] Scheduling an action processor start. Oct 2 20:39:29.845951 update_engine[1342]: I1002 20:39:29.845657 1342 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Oct 2 20:39:29.845951 update_engine[1342]: I1002 20:39:29.845678 1342 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Oct 2 20:39:29.846336 locksmithd[1429]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Oct 2 20:39:29.862094 update_engine[1342]: I1002 20:39:29.862058 1342 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/ Oct 2 20:39:29.862094 update_engine[1342]: I1002 20:39:29.862085 1342 omaha_request_action.cc:269] Request: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: Oct 2 20:39:29.862094 update_engine[1342]: I1002 20:39:29.862092 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Oct 2 20:39:29.863690 update_engine[1342]: I1002 20:39:29.863665 1342 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS Oct 2 20:39:29.863863 update_engine[1342]: I1002 20:39:29.863842 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Oct 2 20:39:30.487933 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.rknp9D.mount: Deactivated successfully. Oct 2 20:39:30.524155 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.12PmjD.mount: Deactivated successfully. Oct 2 20:39:31.005078 update_engine[1342]: I1002 20:39:31.005039 1342 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs Oct 2 20:39:31.005371 update_engine[1342]: I1002 20:39:31.005283 1342 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs Oct 2 20:39:31.005460 update_engine[1342]: I1002 20:39:31.005437 1342 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs Oct 2 20:39:31.357435 update_engine[1342]: I1002 20:39:31.357398 1342 libcurl_http_fetcher.cc:263] HTTP response code: 200 Oct 2 20:39:31.358863 update_engine[1342]: I1002 20:39:31.358839 1342 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded Oct 2 20:39:31.358863 update_engine[1342]: I1002 20:39:31.358860 1342 omaha_request_action.cc:619] Omaha request response: Oct 2 20:39:31.358863 update_engine[1342]: Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.473966 1342 omaha_request_action.cc:409] No update. Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.474006 1342 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.474012 1342 omaha_response_handler_action.cc:36] There are no updates. Aborting. Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.474015 1342 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing. Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.474018 1342 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction Oct 2 20:39:31.474009 update_engine[1342]: I1002 20:39:31.474021 1342 update_attempter.cc:302] Processing Done. Oct 2 20:39:31.474275 update_engine[1342]: I1002 20:39:31.474035 1342 update_attempter.cc:338] No update. Oct 2 20:39:31.474275 update_engine[1342]: I1002 20:39:31.474045 1342 update_check_scheduler.cc:74] Next update check in 41m31s Oct 2 20:39:31.474369 locksmithd[1429]: LastCheckedTime=1696279171 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Oct 2 20:39:32.850737 env[1352]: time="2023-10-02T20:39:32.850696418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:33.004950 env[1352]: time="2023-10-02T20:39:33.004894400Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:33.011095 env[1352]: time="2023-10-02T20:39:33.011051683Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:33.011443 kubelet[2488]: E1002 20:39:33.011417 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:33.011709 kubelet[2488]: E1002 20:39:33.011466 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:33.011971 kubelet[2488]: E1002 20:39:33.011944 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t7qx9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-nggnv_calico-apiserver(77d8a75c-7e22-4697-890d-7260308ce095): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:33.012070 kubelet[2488]: E1002 20:39:33.012003 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:39:33.850327 env[1352]: time="2023-10-02T20:39:33.850271621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:39:33.997724 env[1352]: time="2023-10-02T20:39:33.997659960Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:39:34.000461 env[1352]: time="2023-10-02T20:39:34.000416481Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:39:34.000726 kubelet[2488]: E1002 20:39:34.000702 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:34.000783 kubelet[2488]: E1002 20:39:34.000751 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:39:34.001186 kubelet[2488]: E1002 20:39:34.000864 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bdsgn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-c2qqs_calico-apiserver(a42a3025-5a96-4b68-98d0-af5cda9868b4): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:39:34.001284 kubelet[2488]: E1002 20:39:34.001209 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:39:35.850848 kubelet[2488]: E1002 20:39:35.850812 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:39:38.781974 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.uE1zeu.mount: Deactivated successfully. Oct 2 20:39:40.484985 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.tMhHQE.mount: Deactivated successfully. Oct 2 20:39:41.480238 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.VjpXq3.mount: Deactivated successfully. Oct 2 20:39:43.849967 kubelet[2488]: E1002 20:39:43.849934 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:39:47.851145 kubelet[2488]: E1002 20:39:47.851114 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:39:48.784767 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.ZzfpVJ.mount: Deactivated successfully. Oct 2 20:39:48.852324 kubelet[2488]: E1002 20:39:48.852104 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:39:50.484872 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.hiIeCV.mount: Deactivated successfully. Oct 2 20:39:50.519171 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.DTvHaC.mount: Deactivated successfully. Oct 2 20:39:52.505000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.510782 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:39:52.510926 kernel: audit: type=1400 audit(1696279192.505:1373): avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.505000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007cbbe90 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.562348 kernel: audit: type=1300 audit(1696279192.505:1373): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007cbbe90 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.587199 kernel: audit: type=1327 audit(1696279192.505:1373): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.512000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.610162 kernel: audit: type=1400 audit(1696279192.512:1374): avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.512000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009b8d980 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.638459 kernel: audit: type=1300 audit(1696279192.512:1374): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009b8d980 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.662786 kernel: audit: type=1327 audit(1696279192.512:1374): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.518000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.685247 kernel: audit: type=1400 audit(1696279192.518:1375): avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.518000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400862f080 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.712703 kernel: audit: type=1300 audit(1696279192.518:1375): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400862f080 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.518000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.737346 kernel: audit: type=1327 audit(1696279192.518:1375): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.737488 kernel: audit: type=1400 audit(1696279192.530:1376): avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.530000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.530000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4008158000 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.530000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.530000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009b8da60 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:52.532000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:52.532000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400862f110 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:39:52.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:39:53.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:53.180508 systemd[1]: Started sshd@7-10.200.20.38:22-10.200.12.6:57508.service. Oct 2 20:39:53.229000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.229000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024ef260 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:53.229000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:53.229000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:39:53.229000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400227aab0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:39:53.229000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:39:53.597000 audit[5087]: USER_ACCT pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.598290 sshd[5087]: Accepted publickey for core from 10.200.12.6 port 57508 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:39:53.599000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.599000 audit[5087]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc21ab960 a2=3 a3=1 items=0 ppid=1 pid=5087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:39:53.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:39:53.600311 sshd[5087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:39:53.604311 systemd-logind[1339]: New session 10 of user core. Oct 2 20:39:53.605183 systemd[1]: Started session-10.scope. Oct 2 20:39:53.608000 audit[5087]: USER_START pid=5087 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.611000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.997170 sshd[5087]: pam_unix(sshd:session): session closed for user core Oct 2 20:39:53.998000 audit[5087]: USER_END pid=5087 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:53.998000 audit[5087]: CRED_DISP pid=5087 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:39:54.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:57508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:39:54.000556 systemd[1]: sshd@7-10.200.20.38:22-10.200.12.6:57508.service: Deactivated successfully. Oct 2 20:39:54.001309 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 20:39:54.002174 systemd-logind[1339]: Session 10 logged out. Waiting for processes to exit. Oct 2 20:39:54.002950 systemd-logind[1339]: Removed session 10. Oct 2 20:39:54.850780 kubelet[2488]: E1002 20:39:54.850753 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:39:58.784696 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.4kZGBc.mount: Deactivated successfully. Oct 2 20:40:00.482858 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.3UsEj3.mount: Deactivated successfully. Oct 2 20:40:00.853707 kubelet[2488]: E1002 20:40:00.853672 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:40:01.478943 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.PRxDzV.mount: Deactivated successfully. Oct 2 20:40:01.850903 kubelet[2488]: E1002 20:40:01.850869 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:40:04.078725 systemd[1]: Started sshd@8-10.200.20.38:22-10.200.12.6:42804.service. Oct 2 20:40:04.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:42804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:04.085699 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 20:40:04.085806 kernel: audit: type=1130 audit(1696279204.078:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:42804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:04.533000 audit[5167]: USER_ACCT pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.534115 sshd[5167]: Accepted publickey for core from 10.200.12.6 port 42804 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:04.566561 kernel: audit: type=1101 audit(1696279204.533:1391): pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.566000 audit[5167]: CRED_ACQ pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.567692 sshd[5167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:04.607564 kernel: audit: type=1103 audit(1696279204.566:1392): pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.607693 kernel: audit: type=1006 audit(1696279204.566:1393): pid=5167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 20:40:04.566000 audit[5167]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0975f50 a2=3 a3=1 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:04.632546 kernel: audit: type=1300 audit(1696279204.566:1393): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0975f50 a2=3 a3=1 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:04.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:04.640800 kernel: audit: type=1327 audit(1696279204.566:1393): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:04.643549 systemd-logind[1339]: New session 11 of user core. Oct 2 20:40:04.644029 systemd[1]: Started session-11.scope. Oct 2 20:40:04.648000 audit[5167]: USER_START pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.648000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.696172 kernel: audit: type=1105 audit(1696279204.648:1394): pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:04.696306 kernel: audit: type=1103 audit(1696279204.648:1395): pid=5169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.019600 sshd[5167]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:05.020000 audit[5167]: USER_END pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.022322 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 20:40:05.023088 systemd[1]: sshd@8-10.200.20.38:22-10.200.12.6:42804.service: Deactivated successfully. Oct 2 20:40:05.020000 audit[5167]: CRED_DISP pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.048462 systemd-logind[1339]: Session 11 logged out. Waiting for processes to exit. Oct 2 20:40:05.049314 systemd-logind[1339]: Removed session 11. Oct 2 20:40:05.070360 kernel: audit: type=1106 audit(1696279205.020:1396): pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.070479 kernel: audit: type=1104 audit(1696279205.020:1397): pid=5167 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:42804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.088384 systemd[1]: Started sshd@9-10.200.20.38:22-10.200.12.6:42814.service. Oct 2 20:40:05.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:42814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:05.501000 audit[5181]: USER_ACCT pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.502180 sshd[5181]: Accepted publickey for core from 10.200.12.6 port 42814 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:05.503000 audit[5181]: CRED_ACQ pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.503000 audit[5181]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd69f2630 a2=3 a3=1 items=0 ppid=1 pid=5181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:05.503000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:05.504073 sshd[5181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:05.507744 systemd-logind[1339]: New session 12 of user core. Oct 2 20:40:05.509479 systemd[1]: Started session-12.scope. Oct 2 20:40:05.513000 audit[5181]: USER_START pid=5181 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:05.516000 audit[5183]: CRED_ACQ pid=5183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.553101 sshd[5181]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:06.554000 audit[5181]: USER_END pid=5181 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.554000 audit[5181]: CRED_DISP pid=5181 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:06.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:42814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:06.557058 systemd[1]: sshd@9-10.200.20.38:22-10.200.12.6:42814.service: Deactivated successfully. Oct 2 20:40:06.557843 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 20:40:06.559100 systemd-logind[1339]: Session 12 logged out. Waiting for processes to exit. Oct 2 20:40:06.560583 systemd-logind[1339]: Removed session 12. Oct 2 20:40:06.622985 systemd[1]: Started sshd@10-10.200.20.38:22-10.200.12.6:42830.service. Oct 2 20:40:06.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:42830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:07.035000 audit[5191]: USER_ACCT pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.036487 sshd[5191]: Accepted publickey for core from 10.200.12.6 port 42830 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:07.037000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.037000 audit[5191]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe941d110 a2=3 a3=1 items=0 ppid=1 pid=5191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:07.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:07.038464 sshd[5191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:07.042506 systemd-logind[1339]: New session 13 of user core. Oct 2 20:40:07.043009 systemd[1]: Started session-13.scope. Oct 2 20:40:07.046000 audit[5191]: USER_START pid=5191 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.049000 audit[5193]: CRED_ACQ pid=5193 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.188000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:07.188000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002911740 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:07.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:07.188000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:07.188000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029118c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:07.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:07.190000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:07.190000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001415860 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:07.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:07.191000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:07.191000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002911ac0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:07.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:07.427260 sshd[5191]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:07.427000 audit[5191]: USER_END pid=5191 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.428000 audit[5191]: CRED_DISP pid=5191 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:07.430559 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 20:40:07.430560 systemd-logind[1339]: Session 13 logged out. Waiting for processes to exit. Oct 2 20:40:07.431499 systemd-logind[1339]: Removed session 13. Oct 2 20:40:07.431620 systemd[1]: sshd@10-10.200.20.38:22-10.200.12.6:42830.service: Deactivated successfully. Oct 2 20:40:07.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:42830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:08.850037 kubelet[2488]: E1002 20:40:08.850010 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:40:11.849650 kubelet[2488]: E1002 20:40:11.849616 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:40:15.850657 env[1352]: time="2023-10-02T20:40:15.850613171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:40:16.009457 env[1352]: time="2023-10-02T20:40:16.009396743Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:16.015375 env[1352]: time="2023-10-02T20:40:16.015336293Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:16.015627 kubelet[2488]: E1002 20:40:16.015607 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:16.015943 kubelet[2488]: E1002 20:40:16.015930 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:40:16.016118 kubelet[2488]: E1002 20:40:16.016106 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:16.017216 env[1352]: time="2023-10-02T20:40:16.016993850Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:40:16.198050 env[1352]: time="2023-10-02T20:40:16.197913389Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:16.201846 env[1352]: time="2023-10-02T20:40:16.201795542Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:16.202066 kubelet[2488]: E1002 20:40:16.202047 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:16.202244 kubelet[2488]: E1002 20:40:16.202219 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:40:16.202437 kubelet[2488]: E1002 20:40:16.202423 2488 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7lv46,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-cvqct_calico-system(2983186f-0606-454b-bfe8-ca00bb7b34c1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:16.202635 kubelet[2488]: E1002 20:40:16.202619 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:40:17.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:44738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:17.498021 systemd[1]: Started sshd@11-10.200.20.38:22-10.200.12.6:44738.service. Oct 2 20:40:17.505552 kernel: kauditd_printk_skb: 35 callbacks suppressed Oct 2 20:40:17.524150 kernel: audit: type=1130 audit(1696279217.497:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:44738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:17.915000 audit[5280]: USER_ACCT pid=5280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.915829 sshd[5280]: Accepted publickey for core from 10.200.12.6 port 44738 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:17.939000 audit[5280]: CRED_ACQ pid=5280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.940580 sshd[5280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:17.962132 kernel: audit: type=1101 audit(1696279217.915:1422): pid=5280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.962237 kernel: audit: type=1103 audit(1696279217.939:1423): pid=5280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:17.977290 kernel: audit: type=1006 audit(1696279217.939:1424): pid=5280 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 20:40:17.939000 audit[5280]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeea8bd70 a2=3 a3=1 items=0 ppid=1 pid=5280 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:18.000642 kernel: audit: type=1300 audit(1696279217.939:1424): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeea8bd70 a2=3 a3=1 items=0 ppid=1 pid=5280 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:17.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:18.009258 kernel: audit: type=1327 audit(1696279217.939:1424): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:18.011916 systemd[1]: Started session-14.scope. Oct 2 20:40:18.013112 systemd-logind[1339]: New session 14 of user core. Oct 2 20:40:18.016000 audit[5280]: USER_START pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.020000 audit[5282]: CRED_ACQ pid=5282 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.063965 kernel: audit: type=1105 audit(1696279218.016:1425): pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.064054 kernel: audit: type=1103 audit(1696279218.020:1426): pid=5282 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.338746 sshd[5280]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:18.339000 audit[5280]: USER_END pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.339000 audit[5280]: CRED_DISP pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.366638 systemd[1]: sshd@11-10.200.20.38:22-10.200.12.6:44738.service: Deactivated successfully. Oct 2 20:40:18.367405 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 20:40:18.387744 kernel: audit: type=1106 audit(1696279218.339:1427): pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.387859 kernel: audit: type=1104 audit(1696279218.339:1428): pid=5280 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:18.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:44738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:18.388890 systemd-logind[1339]: Session 14 logged out. Waiting for processes to exit. Oct 2 20:40:18.389632 systemd-logind[1339]: Removed session 14. Oct 2 20:40:18.785416 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.vE3CzK.mount: Deactivated successfully. Oct 2 20:40:20.483216 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.775b5w.mount: Deactivated successfully. Oct 2 20:40:20.514229 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.1WUMfZ.mount: Deactivated successfully. Oct 2 20:40:23.850787 env[1352]: time="2023-10-02T20:40:23.850736343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:24.020111 env[1352]: time="2023-10-02T20:40:24.020052770Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:24.022254 env[1352]: time="2023-10-02T20:40:24.022211167Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:24.022437 kubelet[2488]: E1002 20:40:24.022413 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:24.022738 kubelet[2488]: E1002 20:40:24.022453 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:24.022738 kubelet[2488]: E1002 20:40:24.022577 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t7qx9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-nggnv_calico-apiserver(77d8a75c-7e22-4697-890d-7260308ce095): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:24.022738 kubelet[2488]: E1002 20:40:24.022612 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:40:26.851101 env[1352]: time="2023-10-02T20:40:26.851049819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:40:27.006403 env[1352]: time="2023-10-02T20:40:27.006351677Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:40:27.014686 env[1352]: time="2023-10-02T20:40:27.014628186Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:40:27.015053 kubelet[2488]: E1002 20:40:27.015027 2488 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:27.015320 kubelet[2488]: E1002 20:40:27.015069 2488 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:40:27.015320 kubelet[2488]: E1002 20:40:27.015160 2488 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-bdsgn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-54f56cbb4f-c2qqs_calico-apiserver(a42a3025-5a96-4b68-98d0-af5cda9868b4): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:40:27.015320 kubelet[2488]: E1002 20:40:27.015194 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:40:28.417411 systemd[1]: Started sshd@12-10.200.20.38:22-10.200.12.6:46476.service. Oct 2 20:40:28.443828 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:28.443862 kernel: audit: type=1130 audit(1696279228.417:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:46476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:46476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:28.785376 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.6tbyWK.mount: Deactivated successfully. Oct 2 20:40:28.872000 audit[5356]: USER_ACCT pid=5356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.873229 sshd[5356]: Accepted publickey for core from 10.200.12.6 port 46476 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI Oct 2 20:40:28.877563 sshd[5356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:40:28.876000 audit[5356]: CRED_ACQ pid=5356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.919475 kernel: audit: type=1101 audit(1696279228.872:1431): pid=5356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.919624 kernel: audit: type=1103 audit(1696279228.876:1432): pid=5356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.933434 kernel: audit: type=1006 audit(1696279228.876:1433): pid=5356 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 20:40:28.876000 audit[5356]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa639740 a2=3 a3=1 items=0 ppid=1 pid=5356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:28.936359 systemd[1]: Started session-15.scope. Oct 2 20:40:28.937502 systemd-logind[1339]: New session 15 of user core. Oct 2 20:40:28.958862 kernel: audit: type=1300 audit(1696279228.876:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa639740 a2=3 a3=1 items=0 ppid=1 pid=5356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:28.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:28.968227 kernel: audit: type=1327 audit(1696279228.876:1433): proctitle=737368643A20636F7265205B707269765D Oct 2 20:40:28.959000 audit[5356]: USER_START pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.994038 kernel: audit: type=1105 audit(1696279228.959:1434): pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.994245 kernel: audit: type=1103 audit(1696279228.963:1435): pid=5381 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:28.963000 audit[5381]: CRED_ACQ pid=5381 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.295713 sshd[5356]: pam_unix(sshd:session): session closed for user core Oct 2 20:40:29.296000 audit[5356]: USER_END pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.299816 systemd-logind[1339]: Session 15 logged out. Waiting for processes to exit. Oct 2 20:40:29.301028 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 20:40:29.302169 systemd-logind[1339]: Removed session 15. Oct 2 20:40:29.302843 systemd[1]: sshd@12-10.200.20.38:22-10.200.12.6:46476.service: Deactivated successfully. Oct 2 20:40:29.296000 audit[5356]: CRED_DISP pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.344106 kernel: audit: type=1106 audit(1696279229.296:1436): pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.344240 kernel: audit: type=1104 audit(1696279229.296:1437): pid=5356 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 20:40:29.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:46476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:30.484149 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.DWUKDo.mount: Deactivated successfully. Oct 2 20:40:31.479513 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.vaLtAQ.mount: Deactivated successfully. Oct 2 20:40:31.850331 kubelet[2488]: E1002 20:40:31.850309 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:40:36.850897 kubelet[2488]: E1002 20:40:36.850870 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:40:38.785604 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.Fnseji.mount: Deactivated successfully. Oct 2 20:40:40.483648 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.r6ReQD.mount: Deactivated successfully. Oct 2 20:40:40.850502 kubelet[2488]: E1002 20:40:40.850470 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:40:41.478949 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.uksTqM.mount: Deactivated successfully. Oct 2 20:40:43.578315 systemd[1]: cri-containerd-c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e.scope: Deactivated successfully. Oct 2 20:40:43.578658 systemd[1]: cri-containerd-c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e.scope: Consumed 3.775s CPU time. Oct 2 20:40:43.591109 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:40:43.591393 kernel: audit: type=1334 audit(1696279243.583:1439): prog-id=83 op=UNLOAD Oct 2 20:40:43.583000 audit: BPF prog-id=83 op=UNLOAD Oct 2 20:40:43.583000 audit: BPF prog-id=92 op=UNLOAD Oct 2 20:40:43.602192 kernel: audit: type=1334 audit(1696279243.583:1440): prog-id=92 op=UNLOAD Oct 2 20:40:43.610702 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e-rootfs.mount: Deactivated successfully. Oct 2 20:40:43.629686 env[1352]: time="2023-10-02T20:40:43.629637469Z" level=info msg="shim disconnected" id=c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e Oct 2 20:40:43.630101 env[1352]: time="2023-10-02T20:40:43.630079748Z" level=warning msg="cleaning up after shim disconnected" id=c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e namespace=k8s.io Oct 2 20:40:43.630248 env[1352]: time="2023-10-02T20:40:43.630231668Z" level=info msg="cleaning up dead shim" Oct 2 20:40:43.642065 env[1352]: time="2023-10-02T20:40:43.642020935Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5505 runtime=io.containerd.runc.v2\n" Oct 2 20:40:43.850968 kubelet[2488]: E1002 20:40:43.850936 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:40:44.257196 kubelet[2488]: I1002 20:40:44.256912 2488 scope.go:115] "RemoveContainer" containerID="c04227e0a52adee80ef63b80a463c9fa711ad3f7ff5c6ad7cb655334b485e49e" Oct 2 20:40:44.259470 env[1352]: time="2023-10-02T20:40:44.259420419Z" level=info msg="CreateContainer within sandbox \"2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 20:40:44.280557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount551294343.mount: Deactivated successfully. Oct 2 20:40:44.292623 env[1352]: time="2023-10-02T20:40:44.292578343Z" level=info msg="CreateContainer within sandbox \"2f5e43a6fd397f7bc890a60c0378ee5ad2cb233e6e8b4e13b48ec3e196eec557\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"f6261d3b3c183893e81fb54380d52b5270571041d13618a0a1deabc25a811092\"" Oct 2 20:40:44.293143 env[1352]: time="2023-10-02T20:40:44.293113502Z" level=info msg="StartContainer for \"f6261d3b3c183893e81fb54380d52b5270571041d13618a0a1deabc25a811092\"" Oct 2 20:40:44.313665 systemd[1]: Started cri-containerd-f6261d3b3c183893e81fb54380d52b5270571041d13618a0a1deabc25a811092.scope. Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.367734 kernel: audit: type=1400 audit(1696279244.332:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.367874 kernel: audit: type=1400 audit(1696279244.332:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.390595 kernel: audit: type=1400 audit(1696279244.332:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.415299 kernel: audit: type=1400 audit(1696279244.332:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.433285 kernel: audit: type=1400 audit(1696279244.332:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.451097 kernel: audit: type=1400 audit(1696279244.332:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.468864 kernel: audit: type=1400 audit(1696279244.332:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.469121 kernel: audit: type=1400 audit(1696279244.332:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.350000 audit: BPF prog-id=188 op=LOAD Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2174 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:44.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323631643362336331383338393365383166623534333830643532 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2174 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:44.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323631643362336331383338393365383166623534333830643532 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit: BPF prog-id=189 op=LOAD Oct 2 20:40:44.371000 audit[5527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2174 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:44.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323631643362336331383338393365383166623534333830643532 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit: BPF prog-id=190 op=LOAD Oct 2 20:40:44.371000 audit[5527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2174 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:44.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323631643362336331383338393365383166623534333830643532 Oct 2 20:40:44.371000 audit: BPF prog-id=190 op=UNLOAD Oct 2 20:40:44.371000 audit: BPF prog-id=189 op=UNLOAD Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { perfmon } for pid=5527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit[5527]: AVC avc: denied { bpf } for pid=5527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:44.371000 audit: BPF prog-id=191 op=LOAD Oct 2 20:40:44.371000 audit[5527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2174 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:44.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323631643362336331383338393365383166623534333830643532 Oct 2 20:40:44.495216 env[1352]: time="2023-10-02T20:40:44.495155963Z" level=info msg="StartContainer for \"f6261d3b3c183893e81fb54380d52b5270571041d13618a0a1deabc25a811092\" returns successfully" Oct 2 20:40:44.697000 audit: BPF prog-id=124 op=UNLOAD Oct 2 20:40:44.698139 systemd[1]: cri-containerd-37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344.scope: Deactivated successfully. Oct 2 20:40:44.698450 systemd[1]: cri-containerd-37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344.scope: Consumed 3.617s CPU time. Oct 2 20:40:44.703000 audit: BPF prog-id=127 op=UNLOAD Oct 2 20:40:44.723821 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344-rootfs.mount: Deactivated successfully. Oct 2 20:40:44.745249 env[1352]: time="2023-10-02T20:40:44.745206412Z" level=info msg="shim disconnected" id=37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344 Oct 2 20:40:44.745745 env[1352]: time="2023-10-02T20:40:44.745725571Z" level=warning msg="cleaning up after shim disconnected" id=37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344 namespace=k8s.io Oct 2 20:40:44.745837 env[1352]: time="2023-10-02T20:40:44.745823771Z" level=info msg="cleaning up dead shim" Oct 2 20:40:44.759798 env[1352]: time="2023-10-02T20:40:44.759763596Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5568 runtime=io.containerd.runc.v2\n" Oct 2 20:40:45.259760 kubelet[2488]: I1002 20:40:45.259737 2488 scope.go:115] "RemoveContainer" containerID="37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344" Oct 2 20:40:45.262186 env[1352]: time="2023-10-02T20:40:45.262143535Z" level=info msg="CreateContainer within sandbox \"2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 20:40:45.281452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount988264564.mount: Deactivated successfully. Oct 2 20:40:45.297804 env[1352]: time="2023-10-02T20:40:45.297764577Z" level=info msg="CreateContainer within sandbox \"2003021ad9cbda92ce5e64ae9bcf34d6dd526a551bf95cda18e986989db11165\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0\"" Oct 2 20:40:45.298409 env[1352]: time="2023-10-02T20:40:45.298386696Z" level=info msg="StartContainer for \"7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0\"" Oct 2 20:40:45.333001 systemd[1]: Started cri-containerd-7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0.scope. Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.371000 audit: BPF prog-id=192 op=LOAD Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=2568 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:45.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663437373038383332373733623165626230353839656437363063 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2568 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:45.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663437373038383332373733623165626230353839656437363063 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.372000 audit: BPF prog-id=193 op=LOAD Oct 2 20:40:45.372000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2568 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:45.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663437373038383332373733623165626230353839656437363063 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.373000 audit: BPF prog-id=194 op=LOAD Oct 2 20:40:45.373000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2568 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:45.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663437373038383332373733623165626230353839656437363063 Oct 2 20:40:45.374000 audit: BPF prog-id=194 op=UNLOAD Oct 2 20:40:45.374000 audit: BPF prog-id=193 op=UNLOAD Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { perfmon } for pid=5589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit[5589]: AVC avc: denied { bpf } for pid=5589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:45.374000 audit: BPF prog-id=195 op=LOAD Oct 2 20:40:45.374000 audit[5589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2568 pid=5589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:45.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663437373038383332373733623165626230353839656437363063 Oct 2 20:40:45.399156 env[1352]: time="2023-10-02T20:40:45.399111948Z" level=info msg="StartContainer for \"7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0\" returns successfully" Oct 2 20:40:45.611498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2520843709.mount: Deactivated successfully. Oct 2 20:40:45.698704 kubelet[2488]: E1002 20:40:45.698320 2488 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"calico-apiserver-54f56cbb4f-nggnv.178a64e298f46c7d", GenerateName:"", Namespace:"calico-apiserver", SelfLink:"", UID:"", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"calico-apiserver", Name:"calico-apiserver-54f56cbb4f-nggnv", UID:"77d8a75c-7e22-4697-890d-7260308ce095", APIVersion:"v1", ResourceVersion:"810", FieldPath:"spec.containers{calico-apiserver}"}, Reason:"BackOff", Message:"Back-off pulling image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-96ab8c487b"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 38, 54, 0, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 40, 36, 850811402, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42550->10.200.20.27:2379: read: connection timed out' (will not retry!) Oct 2 20:40:45.700898 kubelet[2488]: I1002 20:40:45.700802 2488 status_manager.go:809] "Failed to get status for pod" podUID=77d8a75c-7e22-4697-890d-7260308ce095 pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42630->10.200.20.27:2379: read: connection timed out" Oct 2 20:40:46.083000 audit[5537]: AVC avc: denied { watch } for pid=5537 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:46.083000 audit[5537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003a4480 a2=fc6 a3=0 items=0 ppid=2174 pid=5537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:46.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:46.084000 audit[5537]: AVC avc: denied { watch } for pid=5537 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:46.084000 audit[5537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000266400 a2=fc6 a3=0 items=0 ppid=2174 pid=5537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c930 key=(null) Oct 2 20:40:46.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:40:49.028346 kubelet[2488]: E1002 20:40:49.028294 2488 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:42744->10.200.20.27:2379: read: connection timed out" Oct 2 20:40:49.032409 systemd[1]: cri-containerd-81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb.scope: Deactivated successfully. Oct 2 20:40:49.032726 systemd[1]: cri-containerd-81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb.scope: Consumed 1.682s CPU time. Oct 2 20:40:49.036000 audit: BPF prog-id=87 op=UNLOAD Oct 2 20:40:49.042010 kernel: kauditd_printk_skb: 114 callbacks suppressed Oct 2 20:40:49.042107 kernel: audit: type=1334 audit(1696279249.036:1481): prog-id=87 op=UNLOAD Oct 2 20:40:49.036000 audit: BPF prog-id=107 op=UNLOAD Oct 2 20:40:49.055105 kernel: audit: type=1334 audit(1696279249.036:1482): prog-id=107 op=UNLOAD Oct 2 20:40:49.070500 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb-rootfs.mount: Deactivated successfully. Oct 2 20:40:49.127838 env[1352]: time="2023-10-02T20:40:49.127787986Z" level=info msg="shim disconnected" id=81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb Oct 2 20:40:49.127838 env[1352]: time="2023-10-02T20:40:49.127830666Z" level=warning msg="cleaning up after shim disconnected" id=81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb namespace=k8s.io Oct 2 20:40:49.127838 env[1352]: time="2023-10-02T20:40:49.127842626Z" level=info msg="cleaning up dead shim" Oct 2 20:40:49.139033 env[1352]: time="2023-10-02T20:40:49.138988935Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5658 runtime=io.containerd.runc.v2\n" Oct 2 20:40:49.278054 kubelet[2488]: I1002 20:40:49.278011 2488 scope.go:115] "RemoveContainer" containerID="81ea923f8658bc15316b7b9a7cbfe2a41e4384c2dcdf44c9d083135ada551ddb" Oct 2 20:40:49.281812 env[1352]: time="2023-10-02T20:40:49.281159272Z" level=info msg="CreateContainer within sandbox \"f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 20:40:49.305310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1134861847.mount: Deactivated successfully. Oct 2 20:40:49.318193 env[1352]: time="2023-10-02T20:40:49.318123275Z" level=info msg="CreateContainer within sandbox \"f6c1d55cf39a1fa0892234bbe649303d81a3ff78cc7129e8df2b09903f28b286\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"4ab359e6c9341e47910742a426880d1eda1ce55b4c2585d2cb71ddbcf02254f4\"" Oct 2 20:40:49.318669 env[1352]: time="2023-10-02T20:40:49.318645714Z" level=info msg="StartContainer for \"4ab359e6c9341e47910742a426880d1eda1ce55b4c2585d2cb71ddbcf02254f4\"" Oct 2 20:40:49.337436 systemd[1]: Started cri-containerd-4ab359e6c9341e47910742a426880d1eda1ce55b4c2585d2cb71ddbcf02254f4.scope. Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.391429 kernel: audit: type=1400 audit(1696279249.355:1483): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.391545 kernel: audit: type=1400 audit(1696279249.355:1484): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.410204 kernel: audit: type=1400 audit(1696279249.355:1485): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.428169 kernel: audit: type=1400 audit(1696279249.355:1486): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.446588 kernel: audit: type=1400 audit(1696279249.355:1487): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.464500 kernel: audit: type=1400 audit(1696279249.355:1488): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.482645 kernel: audit: type=1400 audit(1696279249.355:1489): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.500174 kernel: audit: type=1400 audit(1696279249.355:1490): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit: BPF prog-id=196 op=LOAD Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2217 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:49.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623335396536633933343165343739313037343261343236383830 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2217 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:49.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623335396536633933343165343739313037343261343236383830 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.355000 audit: BPF prog-id=197 op=LOAD Oct 2 20:40:49.355000 audit[5679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2217 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:49.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623335396536633933343165343739313037343261343236383830 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit: BPF prog-id=198 op=LOAD Oct 2 20:40:49.373000 audit[5679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2217 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:49.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623335396536633933343165343739313037343261343236383830 Oct 2 20:40:49.373000 audit: BPF prog-id=198 op=UNLOAD Oct 2 20:40:49.373000 audit: BPF prog-id=197 op=UNLOAD Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { perfmon } for pid=5679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit[5679]: AVC avc: denied { bpf } for pid=5679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:40:49.373000 audit: BPF prog-id=199 op=LOAD Oct 2 20:40:49.373000 audit[5679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2217 pid=5679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:40:49.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623335396536633933343165343739313037343261343236383830 Oct 2 20:40:49.507060 env[1352]: time="2023-10-02T20:40:49.507007245Z" level=info msg="StartContainer for \"4ab359e6c9341e47910742a426880d1eda1ce55b4c2585d2cb71ddbcf02254f4\" returns successfully" Oct 2 20:40:50.486354 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.GjO7ho.mount: Deactivated successfully. Oct 2 20:40:51.849869 kubelet[2488]: E1002 20:40:51.849831 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-nggnv" podUID=77d8a75c-7e22-4697-890d-7260308ce095 Oct 2 20:40:52.507000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.507000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40131fd980 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:52.513000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.513000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400864a1a0 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.513000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:52.519000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.519000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4013207440 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.519000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:52.531000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.531000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400864a380 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.531000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:52.531000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.531000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40131fdb30 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.531000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:52.532000 audit[2372]: AVC avc: denied { watch } for pid=2372 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:40:52.532000 audit[2372]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4013207470 a2=fc6 a3=0 items=0 ppid=2213 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c548 key=(null) Oct 2 20:40:52.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 20:40:54.851537 kubelet[2488]: E1002 20:40:54.851491 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-54f56cbb4f-c2qqs" podUID=a42a3025-5a96-4b68-98d0-af5cda9868b4 Oct 2 20:40:54.852316 kubelet[2488]: E1002 20:40:54.852291 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-cvqct" podUID=2983186f-0606-454b-bfe8-ca00bb7b34c1 Oct 2 20:40:58.783382 systemd[1]: run-containerd-runc-k8s.io-e1a7c3d33b434905e1f9a36a68d61f62473ca7d95fa4eced2b70165a66a5b7c2-runc.094XDa.mount: Deactivated successfully. Oct 2 20:40:59.029184 kubelet[2488]: E1002 20:40:59.029134 2488 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-96ab8c487b?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 20:40:59.077133 systemd[1]: cri-containerd-7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0.scope: Deactivated successfully. Oct 2 20:40:59.076000 audit: BPF prog-id=192 op=UNLOAD Oct 2 20:40:59.082961 kernel: kauditd_printk_skb: 67 callbacks suppressed Oct 2 20:40:59.083054 kernel: audit: type=1334 audit(1696279259.076:1507): prog-id=192 op=UNLOAD Oct 2 20:40:59.090000 audit: BPF prog-id=195 op=UNLOAD Oct 2 20:40:59.098587 kernel: audit: type=1334 audit(1696279259.090:1508): prog-id=195 op=UNLOAD Oct 2 20:40:59.114243 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0-rootfs.mount: Deactivated successfully. Oct 2 20:40:59.183212 env[1352]: time="2023-10-02T20:40:59.183167590Z" level=info msg="shim disconnected" id=7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0 Oct 2 20:40:59.183648 env[1352]: time="2023-10-02T20:40:59.183627949Z" level=warning msg="cleaning up after shim disconnected" id=7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0 namespace=k8s.io Oct 2 20:40:59.183714 env[1352]: time="2023-10-02T20:40:59.183701429Z" level=info msg="cleaning up dead shim" Oct 2 20:40:59.196123 env[1352]: time="2023-10-02T20:40:59.196081539Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:40:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5787 runtime=io.containerd.runc.v2\n" Oct 2 20:40:59.297638 kubelet[2488]: I1002 20:40:59.297604 2488 scope.go:115] "RemoveContainer" containerID="37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344" Oct 2 20:40:59.297947 kubelet[2488]: I1002 20:40:59.297912 2488 scope.go:115] "RemoveContainer" containerID="7df47708832773b1ebb0589ed760caf0646cb72f0d5f5b113eeca270df6686e0" Oct 2 20:40:59.298192 kubelet[2488]: E1002 20:40:59.298149 2488 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-59c686f986-lsdzz_tigera-operator(a77731df-b2cb-4813-99e4-efbcd2246958)\"" pod="tigera-operator/tigera-operator-59c686f986-lsdzz" podUID=a77731df-b2cb-4813-99e4-efbcd2246958 Oct 2 20:40:59.299379 env[1352]: time="2023-10-02T20:40:59.299346889Z" level=info msg="RemoveContainer for \"37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344\"" Oct 2 20:40:59.329601 env[1352]: time="2023-10-02T20:40:59.328692264Z" level=info msg="RemoveContainer for \"37043f5872eba1074f12a88389c5c01ac919d04bee3b6e68d6f9ab7aae9fb344\" returns successfully" Oct 2 20:41:00.483677 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.18pdf6.mount: Deactivated successfully. Oct 2 20:41:01.479768 systemd[1]: run-containerd-runc-k8s.io-ae70bfa23f46cea1a10c024ec4d9c4d40f34c029e17a742d66c1de6afa8b6ae2-runc.XsHME0.mount: Deactivated successfully. Oct 2 20:41:03.916542 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:03.932545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:03.947913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:03.963805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:03.980315 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:03.995855 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.012945 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.029437 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.029568 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.029684 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.039132 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.039342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.056455 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.056720 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.074226 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.074454 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.091891 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.092111 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.108464 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.108699 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.124581 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.124806 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.149561 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.149790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.149903 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.166264 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.166481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.182746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Oct 2 20:41:04.182928 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#60 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001